Home / vulnerabilitiesPDF  

Lime Survey 2.06+ Build 151014 File Download / Code Execution

Posted on 24 October 2015
Source : packetstormsecurity.org Link

 

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SEC Consult Vulnerability Lab Security Advisory < 20151022-0 >
=======================================================================
title: Multiple critical vulnerabilities
product: Lime Survey
vulnerable version: 2.05 up to 2.06+ Build 151014
fixed version: 2.06+ Build 151016
CVE number:
impact: critical
homepage: https://www.limesurvey.org/
found: 2015-10-12
by: P. Morimoto (Office Bangkok)
SEC Consult Vulnerability Lab

An integrated part of SEC Consult
Berlin - Frankfurt/Main - Montreal - Singapore
Vienna (HQ) - Vilnius - Zurich - Bangkok

https://www.sec-consult.com

=======================================================================

Vendor description:
- -------------------
Lime Survey allows users to quickly create intuitive, powerful,
online question-and-answer surveys that can work for tens to thousands
of participants without much effort. The survey software itself is
self-guiding for the respondents who are participating.
Lime Survey has surpassed 1,500,000 downloads and is used by a huge number of
private persons, big companies, academic facilities and governmental
institutions around the world.

URL: https://www.limesurvey.org/en/about-limesurvey/references

Business recommendation:
- ------------------------
By combining the vulnerabilities documented in this advisory,
unauthenticated remote attackers can completely compromise Lime
Survey application server.

- - Arbitrary local files can be downloaded
- - Entire Lime Survey database can be accessed
- - Arbitrary PHP code can be executed

SEC Consult recommends not to use this software until a thorough security
review has been performed by security professionals and all identified
issues have been resolved.

Vulnerability overview/description:
- -----------------------------------
Due to the lack of function level access control many administrative
functions in Lime Survey can be accessed by remote attackers without
prior authentication.

Moreover, the application did not validate some of user input properly.
Unauthenticated attackers can pass specially crafted data to the entry points
result in following vulnerabilities.

1. Unauthenticated local file disclosure
An attacker can craft a malicious PHP serialized string containing a list of
arbitrary files. This list can be sent to the Lime Survey backup feature
for downloading without prior authentication.

Any files accessible with the privileges of the web server user
can be downloaded.

2. Unauthenticated database dump
An attacker can request the database backup feature without authentication.
The whole Lime Survey database can be downloaded including username and
hashed password of the administrator account.

3. Unauthenticated arbitrary remote code execution
An attacker can inject arbitrary PHP code into the application source code
allowing to plant a malicious web backdoor to access underlying web server.

4. Multiple reflective cross-site scripting
The application is prone to multiple reflective cross-site scripting
vulnerabilities.

Proof of concept:
- -----------------
The vendor kindly asked SEC Consult to give people enough time to update
their installations.

Because of the high risk vulnerabilities, the proof of concept
section has been removed from this advisory.

Vulnerable / tested versions:
- -----------------------------
The vulnerabilities have been tested on 2.06+ Build 150930
At least the following versions have been identified to be vulnerable:

Version 2.05 Build 150413 up to 2.06+ Build 151014

Vendor contact timeline:
- ------------------------
2015-10-15: Contacting vendor through Lime Survey bug tracking system
2015-10-15: Vendor acknowledges existence of the vulnerabilities
2015-10-15: Urgent workaround is committed to Lime Survey's code repository
2015-10-16: Vendor asks for giving 6 weeks before disclosing the advisory
2015-10-16: Vendor releases Lime Survey 2.06+ Build 151016 with issues fixed
2015-10-22: SEC Consult releases security advisory without PoC

Solution:
- ---------
Immediately upgrade to Lime Survey 2.06+ Build 151016 or later.
https://www.limesurvey.org/en/blog/76-limesurvey-news/security-advisories/1836-limesurvey-security-advisory-10-2015

Workaround:
- -----------
No workaround available.

Advisory URL:
- -------------
https://www.sec-consult.com/en/Vulnerability-Lab/Advisories.htm

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

SEC Consult Vulnerability Lab

SEC Consult
Berlin - Frankfurt/Main - Montreal - Singapore - Vienna (HQ) - Vilnius - Zurich - Bangkok

About SEC Consult Vulnerability Lab
The SEC Consult Vulnerability Lab is an integrated part of SEC Consult. It
ensures the continued knowledge gain of SEC Consult in the field of network
and application security to stay ahead of the attacker. The SEC Consult
Vulnerability Lab supports high-quality penetration testing and the evaluation
of new offensive and defensive technologies for our customers. Hence our
customers obtain the most current information about vulnerabilities and valid
recommendation about the risk profile of new technologies.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Interested to work with the experts of SEC Consult?
Send us your application https://www.sec-consult.com/en/Career.htm

Interested in improving your cyber security with the experts of SEC Consult?
Contact our local offices https://www.sec-consult.com/en/About/Contact.htm
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Mail: research at sec-consult dot com
Web: https://www.sec-consult.com
Blog: http://blog.sec-consult.com
Twitter: https://twitter.com/sec_consult

EOF Pichaya Morimoto / @2015
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)

iQIcBAEBAgAGBQJWKQCNAAoJEC0t17XG7og/SbgP/isYBJWMltq2rNZe2aj2Rl4U
FnKYjW5c82JNJE0SPXRiAX9Focpdf7ZEmmL0E+gObLPncqsAtghJxcQ1A7h2xygm
fBEo6VJ7CKJTXgjmJGXpdMTDptC4Gb6E7FLKaqq/pOaUV4npl5XoSn1d9Q26KqIP
hRNiwl5kgKnfdORrnqQqNBYUK0Pj5diC+AqiaONU3td8mcrQZb0K32Z4K3Kpvuni
m4yQp6lAbQDXA8J48bLAMdo6GuB7Y7gyKLMwnt9Rf2879QlSCaOktmTiW6mP8sxr
rNBotuwo6T6Dkyvja6W1xG0G7/pLOHKBWB6tUd9CyHEdsKr6uBEBN6dLJ41Brf7o
IoZPBK7pfdmlNnw5ZHUMxJJlIAza0Hrv0Vt7mwLRMWawJKDUzGtlTjG8tnSi1yJ5
ZZlHwDukXXPWfEjjEsRUSayRa9M6WMIbZipExvQn6bCuEalKar4T5LucF44jTKic
9Gj0s6UeWIk3HgGjo6X54wryudlUjOIrubb1bPSgluq9MCnnwOg6zbh+mibkyONW
emZdkAC+cOiCn3Ypppnr1m+BroQA1JeoZHWLrFbmlf+Ms7hhyRktiMAuFe/hxzDo
zJfh+P4tPj9kSMojvugtOEi1q5RGUTVyy+R0bHZUYS+L6qshpGYZwQ10JePHeHPc
6satId8EWVBs0UpP2oJ8
=8pme
-----END PGP SIGNATURE-----

 

TOP