[SCSA-011] Path Disclosure Vulnerability in XOOPS

From: Grégory (gregory.lebras@security-corporation.com)
Date: Thu Mar 20 2003 - 11:58:55 PST

  • Next message: bugzillaat_private: "[Full-Disclosure] [RHSA-2003:108-01] Updated Evolution packages fix multiple vulnerabilities"

    
     ('binary' encoding is not supported, stored as-is)
    ________________________________________________________________________
    
    Security Corporation Security Advisory [SCSA-011]
    ________________________________________________________________________
    
    PROGRAM: XOOPS
    HOMEPAGE: http://www.xoops.org/
    VULNERABLE VERSIONS: v2.0 (and prior ?)
    ________________________________________________________________________
    
    DESCRIPTION
    ________________________________________________________________________
    
    XOOPS is "a dynamic OO (Object Oriented) based open source portal script
    written in PHP. XOOPS is the ideal tool for developing small to large
    dynamic community websites,intra company portals, corporate portals,
    weblogs and much more." (direct quote from XOOPS website)
    
    
    DETAILS & EXPLOITS
    ________________________________________________________________________
    
    ¤ Details Path Disclosure :
    
    A vulnerability have been found in XOOPS which allow attackers to determine
    the physical path of the application.
    
    This vulnerability would allow a remote user to determine the full path to
    the web root directory and other potentially sensitive information.
    This vulnerability can be triggered by a remote user submitting a
    specially crafted HTTP request including invalid input to the
    "$xoopsOption" variable.
    
    ¤ Exploits Path Disclosure :
    
    http://[target]/index.php?xoopsOption=any_word
    
    Affected files:
    admin.php
    edituser.php
    footer.php
    header.php
    image.php
    lostpass.php
    pmlite.php
    readpmsg.php
    register.php
    search.php
    user.php
    userinfo.php
    viewpmsg.php
    class/xoopsblock.php
    modules/contact/index.php
    modules/mydownloads/index.php
    modules/mydownloads/brokenfile.php
    modules/mydownloads/modfile.php
    modules/mydownloads/ratefile.php
    modules/mydownloads/singlefile.php
    modules/mydownloads/submit.php
    modules/mydownloads/topten.php
    modules/mydownloads/viewcat.php
    modules/mylinks/brokenlink.php
    modules/mylinks/index.php
    modules/mylinks/modlink.php
    modules/mylinks/ratelink.php
    modules/mylinks/singlelink.php
    modules/mylinks/submit.php
    modules/mylinks/topten.php
    modules/mylinks/viewcat.php
    modules/newbb/index.php
    modules/newbb/search.php
    modules/newbb/viewforum.php
    modules/newbb/viewtopic.php
    modules/news/archive.php
    modules/news/article.php
    modules/news/index.php
    modules/sections/index.php
    modules/system/admin.php
    modules/xoopsfaq/index.php
    modules/xoopsheadlines/index.php
    modules/xoopsmembers/index.php
    modules/xoopspartners/index.php
    modules/xoopspartners/join.php
    modules/xoopspoll/index.php
    modules/xoopspoll/pollresults.php
    
    SOLUTIONS
    ________________________________________________________________________
    
    No solution for the moment.
    
    
    VENDOR STATUS
    ________________________________________________________________________
    
    The vendor has reportedly been notified.
    
    
    LINKS
    ________________________________________________________________________
    
    Version Française :
    http://www.security-corporation.com/index.php?id=advisories&a=011-FR
    
    
    ------------------------------------------------------------------------
    Grégory Le Bras aka GaLiaRePt | http://www.Security-Corporation.com
    ------------------------------------------------------------------------
    



    This archive was generated by hypermail 2b30 : Thu Mar 20 2003 - 15:32:02 PST