chaozz chaozzdb 权限许可和访问控制漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1183336 漏洞类型 权限许可和访问控制
发布时间 2009-03-24 更新时间 2009-03-24
CVE编号 CVE-2009-1053 CNNVD-ID CNNVD-200903-387
漏洞平台 N/A CVSS评分 5.0
|漏洞来源
https://www.securityfocus.com/bid/79558
https://cxsecurity.com/issue/WLB-2009030215
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200903-387
|漏洞详情
chaozzchaozzdb是一个文件数据库系统。chaozzDB1.2及其早期版本在网根下储存敏感信息,但没有赋予足够的访问限制,这会允许远程攻击者可以借助对user.tsv的一个直接请求,下载一个包含用户认证凭证的数据库。
|漏洞EXP
ECHO_ADV_105$2009

------------------------------------------------------------------------
-----------------

[ECHO_ADV_105$2009] chaozzDB <= 1.2 Critical File Disclosure Vulnerability

------------------------------------------------------------------------
-----------------

Author       : K-159

Date         : March, 16 th 2009

Location     : Jakarta, Indonesia

Web          : http://e-rdc.org/v1/news.php?readmore=129

Critical Lvl : Moderate

Impact       : Exposure of sensitive information

Where        : From Remote

------------------------------------------------------------------------
---

Affected software description:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Application : chaozzDB

version     : <= 1.2

Vendor      : http://chaozz.nl/software/chaozzdb/

Description :

chaozzDB is a flatfile database system, which is small and fast. It supports most of the normal SQL-like statements

(it can insert, delete, update, open and search). It comes with clear and full documentation and a PHP example.

------------------------------------------------------------------------
--

Vulnerability:

~~~~~~~~~~~~~~

Critical user.tsv file in db's folder are vulnerable to direct access to view 'critical' information about username and md5hash password from users.

Poc/Exploit:

~~~~~~~~~

http://www.example.com/[chaozzDB_path]/db/user.tsv

Dork:

~~~~~

Google : "chaozzDB 1.2"

Solution:

~~~~~~~

- add .htaccess in db's folder.

Timeline:

~~~~~~~~~

- 14 - 03 - 2009 bug found

- 14 - 03 - 2009 vendor contacted

- 15 - 03 - 2009 vendor response

- 16 - 03 - 2009 advisory release

------------------------------------------------------------------------
---

Shoutz:

~~~~~

~ ping - my dearest wife, zizou - my beloved son, i-eyes - my beloved daughter.

~ y3dips,the_day,Negatif,moby,comex,z3r0byt3,c-a-s-e,S`to,lirva32,pushm0v,
az001,

the_hydra,neng chika, str0ke

~ scanners [at] SCAN-NUSANTARA and SCAN-ASSOCIATES

~ SK,Abond,pokley,cybertank, super_temon,whatsoever,b120t0,inggar,fachri,adi,rahmat,indra

~ masterpop3,maSter-oP,Lieur-Euy,Mr_ny3m,bithedz,murp,sakitjiwa,x16,cyb3rh
3b,cR4SH3R,ogeb,bagan,devsheed

~ dr188le,cow_1seng,poniman_coy,paman_gembul,ketut,rizal,ghostblup,shamus,

kuntua, stev_manado,nofry,k1tk4t,0pt1c,k1ngk0ng

~ newbie_hacker (at) yahoogroups (dot) com [email concealed]

~ milw0rm.com, macaholic.info, unitiga.com, mac.web.id, indowebster.com

~ #aikmel #e-c-h-o @irc.dal.net

------------------------------------------------------------------------
---

Contact:

~~~~~~

K-159 || echo|staff || adv[at]e-rdc[dot]org

Homepage: http://www.e-rdc.org/

-------------------------------- [ EOF ] ----------------------------------
|受影响的产品
Chaozz Chaozzdb 1.2.2 Chaozz Chaozzdb 1.1 Chaozz Chaozzdb 1.0
|参考资料

来源:BUGTRAQ
名称:20090317[ECHO_ADV_105$2009]chaozzDB<=1.2CriticalFileDisclosureVulnerability
链接:http://www.securityfocus.com/archive/1/archive/1/501901/100/0/threaded
来源:MISC
链接:http://e-rdc.org/v1/news.php?readmore=129