SocialEngine (SocialEngine.net) high risk security flaw

2008.07.26
Credit: Tim L
Risk: High
Local: No
Remote: Yes
CWE: CWE-89
CWE-94

SECURITY ADVISORY CS-2008-2 Vulnerability: Improper validation of external parameters Vendor: SocialEngine (http://www.socialengine.net) Affected versions: <2.83 Risk: High I. DESCRIPTION Improper validation of browser cookies leads to complete control over client host. II. BACKGROUND During client authentication, cookies are used as an input parameters for authorization and validation of identity both as user and as an administrator. It is possible to construct specially crafted cookie parameters which will cause sql injection and give full administrative access rights. Additionally, having full write access templates for smarty based engine, together with all-allow security level for the templates processing, allows injection of php code into templates, gaining complete and undetected control of the server, such as direct access to file system, direct access to any databases. III. ANALYSIS 1. user level entry path via include/class_user.php user_checkCookies -> se_user 2. admin level entry path via include/class_admin.php admin_checkCookies -> se_admin IV. POC EXPLOIT not disclosed, submitted to vendor V. DISCLOSURE TIMELINE 10-Jul-2008 Initial vendor notification 11-Jul-2008 Vendor releases patch 22-Jul-2008 Public Disclosure VI. CREDITS Creogenic Security Tim Loshak tim.loshak (at) gmail (dot) com [email concealed]

References:

http://www.socialengine.net/news.php
http://xforce.iss.net/xforce/xfdb/43958
http://www.securityfocus.com/bid/30342
http://www.securityfocus.com/archive/1/archive/1/494638/100/0/threaded
http://secunia.com/advisories/31203


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020, cxsecurity.com

 

Back to Top