The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] eGroupware SQL Injections and Cross Site Scripting


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 3 May 2005 18:18:58 +0200
Subject: [UNIX] eGroupware SQL Injections and Cross Site Scripting
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20050503153651.4270F5825@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  eGroupware SQL Injections and Cross Site Scripting
------------------------------------------------------------------------


SUMMARY

 <http://www.egroupware.org/>; eGroupware is "a very popular open source 
web based collaboration software that can be used within an intranet, or 
externally via the Internet to build a community and/or help coordinate 
large projects".

Multiple vulnerabilities discovered in eGroupware allow malicious attacker 
to compromise system integrity and endanger its users.

DETAILS

Vulnerable Systems:
 * eGroupware version 1.0.0.006 and prior

Immune Systems:
 * eGroupware version 1.0.0.007

Cross Site Scripting:
Cross site scripting vulnerability exists due to user supplied input not 
being checked properly. Below are examples that can be used for reference:
http://egroupware/index.php?menuaction=addressbook.uiaddressbook.edit 
&ab_id=11[XSS]
http://egroupware/index.php?menuaction=manual.uimanual.view 
&page=ManualAddressbook[XSS]
http://egroupware/index.php?menuaction=forum.uiforum.post &type=new[XSS]
http://egroupware/wiki/index.php?page=RecentChanges&#091;XSS]
http://egroupware/wiki/index.php?action=history 
&page=WikkiTikkiTavi&lang=en[XSS]
http://egroupware/index.php?menuaction=wiki.uiwiki.edit &page=setup[XSS]
http://egroupware/sitemgr/sitemgr-site/?category_id=4&#091;XSS]

This vulnerability could be used to steal cookie based authentication 
credentials within the scope of the current domain, or render hostile code 
in a victim's browser.

SQL Injection:
There are a number of SQL Injection vulnerabilities in eGroupware. These 
issues can be used by an attacker to retrieve sensitive
information from the underlying database and aid in further attacks. 
Examples below:
http://egroupware/tts/index.php?filter=u99&#091;SQL]
http://egroupware/tts/index.php?filter=c99&#091;SQL]
http://egroupware/index.php?menuaction=preferences.uicategories.index 
&cats_app=foobar[SQL]

Patch Availability:
eGroupware 1.0.0.007 has been released to address these issues, and users 
can finfd the updated packages at the following location:
 <http://sourceforge.net/project/showfiles.php?group_id=78745>; 
http://sourceforge.net/project/showfiles.php?group_id=78745


ADDITIONAL INFORMATION

The information has been provided by  <mailto:security@gulftech.org.> 
GulfTech Security Research.
The original article can be found at:  
<http://www.gulftech.org/?node=research&article_id=00069-04202005>; 
http://www.gulftech.org/?node=research&article_id=00069-04202005




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру