PostNuke Sensitive Information Disclosure

From: rkc (rkcat_private)
Date: Wed Mar 26 2003 - 15:47:03 PST

  • Next message: Dan Harkless: "Re: Vulnerability (critical): Digital signature for Adobe Acrobat/Reader plug-in can be forged"

    Title: PostNuke path disclosure, and... (db name).
    Version: 0.7.2.3-Phoenix (other)
    Problem: 
    
    A vulnerability have been found in Postnuke (v0.7.2.3-Phoenix) which allow 
    users to determine the physical path of this cms. 
    
    This vulnerability would allow a remote user to determine the full path to 
    the web root directory and other information, like the database name (!) 
    
    
    Example: 
    
    http://www.target.com/modules.php?op=modload&name=Members_List&file=index&le 
    tter=All&sortby=uname1234 
    
    Change 1234 by anything. 
    
    
     ----- 
    
    If you are looking for: 
    
    * Path disclosure in 0.7.2.2 & 0.7.2.1 v:
    (Two simples examples) 
    
    http://www.target.com/modules.php?op=modload&name=Stats&file= 
    
    http://www.target.com/modules.php?op=modload&name=Members_List&file=index&le 
    tter=Svi&sortby=uname1234 
    
    (Change 1234 by anything). 
    
    (not.always) 
    
     ----- 
    
    Solutions: 
    
    Change the Member_List privileges, for admin's only (?)
    Deactivate the Member_List module (?) 
    
     ----- 
    
    
    Greetz ! 
    
    
    rkc 
    
    ~
    Rep. Argentina
    6765656B207374796C65
    StFU, and RtFM !
    



    This archive was generated by hypermail 2b30 : Thu Mar 27 2003 - 17:29:08 PST