exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

PHPShell 2.4 Session Fixation

PHPShell 2.4 Session Fixation
Posted Feb 20, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

PHPShell version 2.4 suffers from a session fixation vulnerability.

tags | exploit
SHA-256 | 4d3e68fa934c658be060dde83430cd5e40c88c9284c159ca2afcfe12baa190cd

PHPShell 2.4 Session Fixation

Change Mirror Download
[+] Credits: John Page AKA hyp3rlinx
[+] Website: hyp3rlinx.altervista.org
[+] Source:
http://hyp3rlinx.altervista.org/advisories/PHPSHELL-v2.4-SESSION-FIXATION.txt
[+] ISR: ApparitionSec



Vendor:
==================================
sourceforge.net/projects/phpshell/
phpshell.sourceforge.net/



Product:
==============
PHPShell v2.4



Vulnerability Type:
===================
Session Fixation



CVE Reference:
==============
N/A



Security Issue:
================
PHPShell does not regenerate the Session ID upon authentication, this can
potentially allow remote attackers to access parts of the application
using only a valid PHPSESSID if PHP.INI setting for
session.use_only_cookies=0.

Since an existing XSS vulnerability exists in PHPShell "
http://hyp3rlinx.altervista.org/advisories/PHPSHELL-v2.4-CROSS-SITE-SCRIPTING.txt"
the risk is
increased if an authenticated user clicks an attacker supplied link and the
attacker finds way to access or set the victims Cookie.

In 'phpshell.php' line 153 we see call to PHP function session_start();

After user authentication no call to "session_regenerate_id()" is made
leaving the authenticated session id same as pre-auth session id.
However, "session.use_only_cookies=1" is default since PHP 4.3.0, so to
exploit it would require that PHP.INI is set to session.use_only_cookies=0
on the victims system.

When accessing the application using the session fixation flaw and
attempting to run system command the application luckily redirects to login
form.
However, if a victim is actively changing directorys, reading files etc...
attackers may still be able to read current directory and files open
in the victims PHPShell console window.



Exploit/POC:
=============

1) Login to PHPShell run commands to CD to Windows directory and run DIR
command etc, then find and copy the PHPSESSID Cookie

2) Open a second browser (InternetExplorer) and access the application
cleanly for first time using the PHPSESSID in URL.

e.g.

http://VICTIM-IP/phpshell-2.4/phpshell.php?PHPSESSID=<STOLEN-SESSION-ID>

You should see what the authenticated victim now sees...

e.g.

Current Working Directory:
Change to subdirectory:

07/13/2009 08:51 PM 24,576 Microsoft.MediaCenter.iTv.Hosting.dll
11/20/2010 10:24 PM 147,968 Microsoft.MediaCenter.iTV.Media.dll
07/13/2009 08:52 PM 45,056 Microsoft.MediaCenter.ITVVM.dll
11/20/2010 10:24 PM 56,320 Microsoft.MediaCenter.Mheg.dll
11/20/2010 10:24 PM 114,688 Microsoft.MediaCenter.Playback.dll
11/20/2010 10:24 PM 1,572,864 Microsoft.MediaCenter.Shell.dll
11/20/2010 10:24 PM 241,664 Microsoft.MediaCenter.Sports.dll
11/20/2010 10:24 PM 327,168
Microsoft.MediaCenter.TV.Tuners.Interop.dll
11/20/2010 10:24 PM 2,596,864 Microsoft.MediaCenter.UI.dll
10/29/2011 12:23 AM 465,920 mstvcapn.dll
11/20/2010 10:24 PM 88,576 NetBridge.dll
07/13/2009 08:51 PM 106,496 RegisterMCEApp.exe
06/10/2009 04:04 PM 129,528 segmcr.ttf

etc...



Network Access:
===============
Remote




Severity:
=========
Medium



Disclosure Timeline:
=============================
Vendor Notification: No reply
Also, the INSTALL file "Bugs? Comments? Tracker System link" is HTTP 404
http://sourceforge.net/tracker/?group_id=156638
February 18, 2017 : Public Disclosure



[+] Disclaimer
The information contained within this advisory is supplied "as-is" with no
warranties or guarantees of fitness of use or otherwise.
Permission is hereby granted for the redistribution of this advisory,
provided that it is not altered except by reformatting it, and
that due credit is given. Permission is explicitly given for insertion in
vulnerability databases and similar, provided that due credit
is given to the author. The author is not responsible for any misuse of the
information contained herein and accepts no responsibility
for any damage caused by the use or misuse of this information. The author
prohibits any malicious use of security related information
or exploits by the author or elsewhere. All content (c) HYP3RLINX -
ApparitionSec

hyp3rlinx
Login or Register to add favorites

File Archive:

November 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    1 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    0 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    219 Files
  • 14
    Nov 14th
    19 Files
  • 15
    Nov 15th
    66 Files
  • 16
    Nov 16th
    38 Files
  • 17
    Nov 17th
    9 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    11 Files
  • 22
    Nov 22nd
    56 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    36 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    14 Files
  • 28
    Nov 28th
    30 Files
  • 29
    Nov 29th
    35 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close