Re: PostNuke Sensitive Information Disclosure

From: Kilmarac Jarov - (kilmaracat_private)
Date: Thu Mar 27 2003 - 17:28:40 PST

  • Next message: Joel Palmius: "Mod_Survey ENV tag vulnerability"

    I must be missing what you are saying to replace 1234 with, as I didnt get
    anything but errors.
    
    However,
    
    Deactivating the module only would not be sufficient as the module itself is
    still accessible.
    
    I would say that if you want to secure it completely, either remove it from
    the modules, or rename it to something unique so that it cant be found.
    
    
    ----- Original Message -----
    From: "rkc" <rkcat_private>
    To: <bugtraqat_private>
    Sent: Wednesday, March 26, 2003 6:47 PM
    Subject: PostNuke Sensitive Information Disclosure
    
    
    > Title: PostNuke path disclosure, and... (db name).
    > Version: 0.7.2.3-Phoenix (other)
    > Problem:
    >
    > A vulnerability have been found in Postnuke (v0.7.2.3-Phoenix) which allow
    > users to determine the physical path of this cms.
    >
    > This vulnerability would allow a remote user to determine the full path to
    > the web root directory and other information, like the database name (!)
    >
    >
    > Example:
    >
    >
    http://www.target.com/modules.php?op=modload&name=Members_List&file=index&le
    > tter=All&sortby=uname1234
    >
    > Change 1234 by anything.
    >
    >
    >  -----
    >
    > If you are looking for:
    >
    > * Path disclosure in 0.7.2.2 & 0.7.2.1 v:
    > (Two simples examples)
    >
    > http://www.target.com/modules.php?op=modload&name=Stats&file=
    >
    >
    http://www.target.com/modules.php?op=modload&name=Members_List&file=index&le
    > tter=Svi&sortby=uname1234
    >
    > (Change 1234 by anything).
    >
    > (not.always)
    >
    >  -----
    >
    > Solutions:
    >
    > Change the Member_List privileges, for admin's only (?)
    > Deactivate the Member_List module (?)
    >
    >  -----
    >
    >
    > Greetz !
    >
    >
    > rkc
    >
    > ~
    > Rep. Argentina
    > 6765656B207374796C65
    > StFU, and RtFM !
    
    
    ---
    Outgoing mail is certified Virus Free.
    Checked by AVG anti-virus system (http://www.grisoft.com).
    Version: 6.0.463 / Virus Database: 262 - Release Date: 3/17/2003
    



    This archive was generated by hypermail 2b30 : Fri Mar 28 2003 - 11:59:13 PST