On Mon, Nov 30, 2009 at 09:06:44PM +0700, Nam Nguyen wrote:
> BLUE MOON SECURITY ADVISORY 2009-07
> ===================================
> 
> 
> :Title: Backdoor in PyForum
> :Severity: Critical
> :Reporter: Blue Moon Consulting
> :Products: PyForum v1.0.3
> :Fixed in: --
> 
> 
> Description
> -----------
> 
> pyForum is a 100% python-based message board system based in the excellent 
> web2py framework.
> 
> We have discovered a backdoor in PyForum. Anyone could force a password reset 
> on behalf of other users whose emails are known. More importantly, the 
> software author, specifically, can obtain the new Administrator's password 
> remotely.
> 
> The problem is in module ``forumhelper.py``. A new password is generated and 
> saved in the database. Then a notification email which contains this new 
> password in plaintext is sent to the user. There is no password reset 
> confirmation code or similar verification action required. This causes a mild 
> annoyance, or at most an account lockout.
> 
> When it comes to Administrator account, however, the problem is more severe. 
> This default account's email is set to ``administra...@pyforum.org`` and can 
> only be changed directly in the database. Therefore, new password is sent to 
> the software author by default. And since this email address is known, 
> everyone can request a password reset easily.
> 
> This bug may exist in older versions and in zForum, from which pyForum 
> derives, too.
> 
> Workaround
> ----------
> 
> Change Administrator's email address immediately and do not publish it 
> anywhere.
> 
> Fix
> ---
> 
> There is no fix at the moment.
> 
> Disclosure
> ----------
> 
> Blue Moon Consulting adapts `RFPolicy v2.0 
> <http://www.wiretrip.net/rfp/policy.html>`_ in notifying vendors.
> 
> Considered this *an intentional backdoor*, we decided to alert the public 
> immediately.
> 
> :Initial vendor contact:
> 
>   --
> 
> :Vendor response:
> 
>   --
> 
> :Further communication:
> 
>   --
> 
> :Public disclosure: November 30, 2009
> 
> :Exploit code:
> 
>   No exploit code required.
> 
> Disclaimer
> ----------
> 
> The information provided in this advisory is provided "as is" without 
> warranty of any kind. Blue Moon Consulting Co., Ltd disclaims all warranties, 
> either express or implied, including the warranties of merchantability and 
> fitness for a particular purpose. Your use of the information on the advisory 
> or materials linked from the advisory is at your own risk. Blue Moon 
> Consulting Co., Ltd reserves the right to change or update this notice at any 
> time.

CVE-2009-5025 has been assigned for this issue.

Best regards,
Henri Salo

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to