php-nuke again ...

From: Karol Wiêsek (appelastat_private)
Date: Wed Jan 15 2003 - 11:06:51 PST

  • Next message: Greg Troxel: "Gabber 0.8.7 leaks presence information without user authorization"

    -----BEGIN PGP SIGNED MESSAGE-----
    
    I. BACKGROUND
    
    PHP-Nuke is a popular Web portal system.
    
    Project homepage : http://www.phpnuke.org
    
    II. DESCRIPTION
    
    Remote attacker could transfer to server his own file or copy
    arbitrary file from system to accessible directory. The result
    of such acts could be remote execution commands under privileges
    of httpd server, or retrieving important information such as 
    database login and password. Attacker even don't have to be 
    registered user to make an attack,but needs writable directory.
    
    The crux of the problem lies in WebMail module, and exactly
    int mailattach.php file. This Module is default attached to
    PHP-nuke 6.0 ( current ). And even this module don't have to be
    active to make an attack successful, because it can be accessed
    directly ( no modules.php in $PHP_SELF check present in this file).
    
    snip from mailatach.php
    
    if (isset($userfile) AND $userfile != "none") {
        if (ini_get(file_uploads) AND $attachments == 1) {
    	$updir = "tmp";
    	@copy($userfile, "$updir/$userfile_name");
    
    Sample attack which allows an attacker to grab database password
    and login.
    
    http://target.server/modules/WebMail/mailattach.php?
    userfile=../../config.php&userfile_name=../attachments/file.txt&
    attachments=1
    
    Using mailattach.php attacker could upload file with any extension,
    which allow him to upload any .php file and execute arbitrary PHP
    code.
    
    To successfully exploiting this vulnerability writable directory is
    needed.
    When module is active, the tmp and attachmenst should be writable to
    allow 
    module work properly. 
    
    III. ANALYSIS
    
    Remote exploitation allows an attacker to execute arbitrary 
    commands and code under the privileges of the web server. This also
    opens the door to privilege escalation attacks. Attacker could also
    debug httpd child processes and grab secret information like users
    pop3 passwords used to authentication to remote pop3 server in
    WebMail
    module. Having database password he also has access to all
    information
    about users.
    
    IV. DETECTION
    
    PHP-nuke 6.0 with WebMail 0.9.3 is confirmed vulnerable.
    
    - -- 
    Karol Wiêsek [appelast-at-bsquad.sm.pl]
    
    -----BEGIN PGP SIGNATURE-----
    Version: PGP 6.5.8
    Comment: Bear Software, LLC,  http://bear-software.freeservers.com
    
    iQCVAwUBPiWjO0KKOIVhErCVAQFW0AQAsxm9rEwQtGj+VTx0TSqjexCIVT3Z4YMi
    spBSb4v3YtY7nV8KplH4aFhxg54Rhl5IfqjHQqR0B+9rbOifrNnr5mCnspPFJqE6
    mybb77loL52ix1+eIuFi+fv5tKYs8IGKP0cEoBokGB2PsxUwRSdJeI4FFK3uZ7sI
    XbaBKSCo8fQ=
    =rg6d
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Tue Jan 21 2003 - 02:54:39 PST