[UNIX] eGroupware SQL Injections and Cross Site Scripting
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 3 May 2005 18:18:58 +0200
Subject: [UNIX] eGroupware SQL Injections and Cross Site Scripting
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20050503153651.4270F5825@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html
- - - - - - - - -
eGroupware SQL Injections and Cross Site Scripting
------------------------------------------------------------------------
SUMMARY
<http://www.egroupware.org/> eGroupware is "a very popular open source
web based collaboration software that can be used within an intranet, or
externally via the Internet to build a community and/or help coordinate
large projects".
Multiple vulnerabilities discovered in eGroupware allow malicious attacker
to compromise system integrity and endanger its users.
DETAILS
Vulnerable Systems:
* eGroupware version 1.0.0.006 and prior
Immune Systems:
* eGroupware version 1.0.0.007
Cross Site Scripting:
Cross site scripting vulnerability exists due to user supplied input not
being checked properly. Below are examples that can be used for reference:
http://egroupware/index.php?menuaction=addressbook.uiaddressbook.edit
&ab_id=11[XSS]
http://egroupware/index.php?menuaction=manual.uimanual.view
&page=ManualAddressbook[XSS]
http://egroupware/index.php?menuaction=forum.uiforum.post &type=new[XSS]
http://egroupware/wiki/index.php?page=RecentChanges[XSS]
http://egroupware/wiki/index.php?action=history
&page=WikkiTikkiTavi&lang=en[XSS]
http://egroupware/index.php?menuaction=wiki.uiwiki.edit &page=setup[XSS]
http://egroupware/sitemgr/sitemgr-site/?category_id=4[XSS]
This vulnerability could be used to steal cookie based authentication
credentials within the scope of the current domain, or render hostile code
in a victim's browser.
SQL Injection:
There are a number of SQL Injection vulnerabilities in eGroupware. These
issues can be used by an attacker to retrieve sensitive
information from the underlying database and aid in further attacks.
Examples below:
http://egroupware/tts/index.php?filter=u99[SQL]
http://egroupware/tts/index.php?filter=c99[SQL]
http://egroupware/index.php?menuaction=preferences.uicategories.index
&cats_app=foobar[SQL]
Patch Availability:
eGroupware 1.0.0.007 has been released to address these issues, and users
can finfd the updated packages at the following location:
<http://sourceforge.net/project/showfiles.php?group_id=78745>
http://sourceforge.net/project/showfiles.php?group_id=78745
ADDITIONAL INFORMATION
The information has been provided by <mailto:security@gulftech.org.>
GulfTech Security Research.
The original article can be found at:
<http://www.gulftech.org/?node=research&article_id=00069-04202005>
http://www.gulftech.org/?node=research&article_id=00069-04202005
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: [email protected]
In order to subscribe to the mailing list, simply forward this email to: [email protected]
DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.