exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ralfchat12.txt

ralfchat12.txt
Posted Jul 12, 2000
Authored by Daniel Wischnewski

Ralf Chat 1.2, a free CGI based chat system has remote vulnerabilities. User passwords can be retrieved in plain text and the default admin password is rarely changed.

tags | exploit, remote, cgi, vulnerability
SHA-256 | 21496428c515d4f09bbdd9f2637fed3eefe3cd485f5e1fdd028a2f105210de2f

ralfchat12.txt

Change Mirror Download
RALF'S CHAT V.12 - http://www.ralfchat.de


Ralf's Chat is a free cgi based chat program. But Ralf's Chat has some awful bugs in it.
I played myself with the CGI and discovered that the masterpassword is set by a default
password called: mpw
So, if someone else who carries on this chatedited the config.pm line 10:

$masterpassword = "mpw"; # Masterpassword for special commands

an attacker could execute all chat operations only knowing the default masterpassword.
I discovered that many newbies who have created their own homepages with this chatroom
aren't be able to modify line 10 and set a new password.
So if anybody is using this chat please open the "config.pm" with notepad (or whatever you like)
and edit the "mpw" to your password.

But that's not all ! Some CGI newbies sets the CHMOD rights wrong, this means that another person
is able to read the "config.pm" file by using this address:

http://www.target-domain.com/cgi-bin/config.pm

So secure this awful bug set the chmod to 711.

I asked myself how the encrpytion works using the registration process joiing the chatroom.
If you install the CGI script you must create a folder called "data" where the CHMOD rights
must be 777 (read, write, execute to anybody).
If someone else put an adress like http://www.target-domain.com/cgi-bin/data/
in the webbrowser the attacker could see all existing files.
You can put an index.htm to the /data directory to hide the files making the index.htm working.
But now the attacker could read the "nicks" file where the the passwords are saved in plain text.

A "nicks" file could be like this one:

Daniel;;mypassword;;daniel@wischnewski.net;;Mon Jul 10 07:39:45 2000;;963240000;;10;;standard;;;;;;0;;;;149.225.26.75;;0
Test;;tester;;test@temp.com;;Mon Jul 10 09:05:12 2000;;963240000;;10;;standard;;;;;;0;;;;212.68.121.195;;0
Yet;;another;;yet@another.com;;Mon Jul 10 11:24:48 2000;;963240000;;10;;standard;;;;;;0;;;;198.195.137.145;;0

You can see that the first registered name was "Daniel", his password is "mypassword" with the specified email adress
"daniel@wischnewski.net", on the 10th July at 07:39:45 pm with the IP 149.225.26.75.
The other two lines are only an example.

Bad guys will read the "nicks" file by using the:
http://www.target-domain.com/cgi-bin/data/nicks
address in webbrowsers. Try the offical demo page at Ralf's page to vie ***all*** registered users with details by using
this address: http://cgi.exit.de/~ralfchat2/demo/data/nicks

Now the bad guy can login with a registered user name and change the password the user registered with.

If you'd like to secure this chatroom, open the perl programmed scripts and search for "nicks".
Change the nicks in anything you like, but be sure to backup the scripts before editing.
You can although change the chmod to 600.

Best Regards,
Daniel Wischnewski
daniel@wischnewski.net


Atfer mailing the bug to Ralf he fixed the CHMOD right at his site, so the http://cgi.exit.de/~ralfchat2/demo/data/nicks trick
will be no longer working. Thanks to Ralf for this cool chat.
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close