The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] Multiple Vulnerabilities in NukeBookmarks (Full path disclosure, Cross Site Scripting, SQL Injection)


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 30 Mar 2005 11:59:44 +0200
Subject: [UNIX] Multiple Vulnerabilities in  NukeBookmarks (Full path disclosure, Cross Site Scripting, SQL Injection)
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20050330121610.800065746@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Multiple Vulnerabilities in  NukeBookmarks (Full path disclosure, Cross 
Site Scripting, SQL Injection)
------------------------------------------------------------------------


SUMMARY

" <http://nukebookmarks.sourceforge.net/>; Nuke Bookmarks is a module for 
PHP-Nuke that allows users to store their own personal bookmarks on the 
server, much like Yahoo Bookmarks."

Full path disclosure, Cross Site Scripting and SQL Injection 
vulnerabilities discovered in NukeBookmarks, compromising th system.

DETAILS

Vulnerable Systems:
 * NukeBookmarks Version .6

Immune Systems:
 * NukeBookmarks Version .7

Full Path Disclosure Vulnerability:
It's possible to retrieve the full installation path of NukeBookmarks. In 
marks.php, some database queries can be manipulated by the user. If the 
resulting SQL query is illegal, the functions that runs that query will 
return an SQL error, revealing full installation path.

Examples:
http://example.com/modules.php?name=Bookmarks&file=marks
http://example.com/modules.php?name=Bookmarks&file=marks&category=1\'

Cross Site Scripting Vulnerability:
Almost all of the input variables supplied by the user aren't checked and 
filtered properly. It's possible to inject malicious javascript code into 
the page and perform a cross site scripting attack.

Examples:
http://www.nukesite.com/modules.php?name=Bookmarks&file=del_cat&catname=&#091;code]
http://www.nukesite.com/modules.php?name=Bookmarks&file=del_mark&markname=&#091;code]
http://www.nukesite.com/modules.php?name=Bookmarks&file=edit_cat&catname=&#091;code]
http://www.nukesite.com/modules.php?name=Bookmarks&file=edit_cat&catcomment=&#091;code]
http://www.nukesite.com/modules.php?name=Bookmarks&file=marks&catname=&#091;code]
http://www.nukesite.com/modules.php?name=Bookmarks&file=uploadbookmarks&category=&#091;code]

SQL Injection:
It's possible to get any content and manipulate the database by exploiting 
a SQL Injection vulnerability in marks.php

Example:
http://www.nukesite.com/modules.php?name=Bookmarks&file=marks&catname=1 
&category=-1/**/union/**/select%200,aid,0,pwd,0,0%20from%20nuke_authors
This example will get the list of PHPNuke authors and the relative hashes 
of the passwords.


ADDITIONAL INFORMATION

The information has been provided by  <mailto:astharot@zone-h.org.> Gerardo 
Astharot Di Giacomo.
The original article can be found at:  
<http://zone-h.org/advisories/read/id=7356>; 
http://zone-h.org/advisories/read/id=7356




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру