Pointter PHP Micro-Blogging Social Network 1.0 Privilege Escalation

2010.12.16
Risk: High
Local: No
Remote: Yes
CWE: CWE-287


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

'Pointter PHP Micro-Blogging Social Network' Unauthorized Privilege Escalation (CVE-2010-4333) Mark Stanislav - mark.stanislav@gmail.com I. DESCRIPTION --------------------------------------- A vulnerability exists in the 'Pointter PHP Micro-Blogging Social Network' authentication system which allows for administrative privileges by crafting two specific cookies with arbitrary values. II. TESTED VERSION --------------------------------------- 1.8 III. PoC EXPLOIT --------------------------------------- Using whatever method you prefer, generate 'auser' and 'apass' cookies. The values of each cookie are irrelevant; the mere presence of the cookies provide the administrative privilege. IV. NOTES --------------------------------------- * Here's a snippet of the final reply that I received from the vendor: "Of course, it could be made safer and we know how to do it. But we have designed the softwares so that renaming admin folder gives us less work. As you know, the users should know the security issues as they will run this and not us." V. SOLUTION --------------------------------------- * There is no update released at this time. Avoidance of this software is recommended until an updated version is available. VI. REFERENCES --------------------------------------- http://www.pointter.com/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4333 http://www.uncompiled.com/2010/12/pointter-php-micro-blogging-social-network-unauthorized-privilege-escalation-cve-2010-4333/ VII. TIMELINE --------------------------------------- 11/23/2010 - Initial vendor disclosure e-mail sent 11/24/2010 - Reply from vendor informing me that my 'software manipulation' was illegal 11/24/2010 - Response to vendor regarding their accusation of illegal actions on my part 11/24/2010 - Reply from vendor stating that by releasing this information, I am committing a crime 11/24/2010 - Response to vendor that their software is CC-licensed and that their accusations are unfounded 11/24/2010 - Rebuttal from vendor again affirming I was breaking the law by disclosing this vulnerability 11/24/2010 - Reply to vendor again stating my intent to help the company and provide responsible disclosure 11/24/2010 - Response from vendor stating they would no longer respond and explained their stance on fixing this issue 11/24/2010 - Final reply to vendor stating that I was happy to work with them on a delayed disclosure if desired 12/15/2010 - Public disclosure _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

References:

http://www.uncompiled.com/2010/12/pointter-php-micro-blogging-social-network-unauthorized-privilege-escalation-cve-2010-4333/
http://www.securityfocus.com/archive/1/archive/1/515306/100/0/threaded
http://www.exploit-db.com/exploits/15741


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top