what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

rnnguest12.txt

rnnguest12.txt
Posted Dec 1, 2003
Authored by Chris Rahm

The RNN Guestbook version 1.2 has multitudes of vulnerabilities. They range from allowing a remote attacker to execute commands to the ability to achieve full administrative access without authentication. Full descriptions and exploitation enclosed.

tags | exploit, remote, vulnerability
SHA-256 | bbc07675f04461c29b805cfaf9019fee859075f88d1bcbb7eef350c4e27c9d74

rnnguest12.txt

Change Mirror Download
 RNN's Guestbook 1.2 Multiple Vulnerabilies Discovered by
Chris Rahm (aka: BrainRawt) (brainrawt at haxworx.com)


Vulnerabilities: Remote Command Execution
Administrative Access
Information Disclosure (Reading of Files)
Arbitrary HTML Insertion/Script Injection
Plain Text Administrative Password

Remote: Yes
Local: Yes
Risk: High

Vulnerable: Guestbook 1.2


About Guestbook
---------------
Guestbook is an easily customizable CGI script that allows
visitors to post messages for others to read.

Guestbook 1.2 can be downloaded at the following address.

http://www.cbvfd.com/rnn/scripts/guestbook.htm


Vendor Contact
--------------
10-11-03 - Sent an email to webmaster at cbvfd.com
"ATT: Mike Reed (author)"
(No Reply)

10-12-03 - Sent an email to Mike Reed at mike at cbvfd.com
(No Reply)

10-16-03 - Sent another email to mike at cbvfd.com
(No Reply)

10-19-03 - Sent email to (Mike's other email)
zmlr15 at imail.etsu.edu.
(Failed Recipient)

10-20-03 - Posted a msg on the cbvfd.com msgboard.
(No Response Yet)

10-20-03 - Called Mike via phone.
(No Answer)

10-25-03 - Sent an email to another one of Mike's addresses.
reed2323 at cbvfd.com

10-26-03 - Recieved an email from Mike and replied with a
a copy of this advisory.

11-26-03 - No word from author since he had received a copy
of this advisory. Releasing information to bugtraq.

Administrative Access Vulnerabilities
-------------------------------------
If an attacker was to visit ~/gbadmin.cgi, he/she would be
prompted for a password. But if that same attacker was to
go directly to the QUERY_STRING and fill in the values for
"action", he/she could have total control over the guestbook
without the need of any authentication.

EXAMPLES:

1. ~/gbadmin.cgi?action=change_adminpass - Change password

2. ~/gbadmin.cgi?action=delete_guests - Delete ALL posts on the guestbook.

3. ~/gbadmin.cgi?action=setup - Change setup information for guestbook.

4. ~/gbadmin.cgi?action=colors - Modify the look and feel of the guestbook

5. ~/gbadmin.cgi?action=change_automail - Change emailing information


Information Disclosure Vulnerability (Reading of Files)
-------------------------------------------------------
By taking advantage of the Administrative Access Vulnerabilites, an
attacker could visit ~/gbadmin.cgi?action=setup and change the
"guestbook entry file" path to point towards any file (EX: /etc/passwd)
on the system readable by the account inwhich the httpd is running.
After making this change, the attacker would view guestbook.cgi not
to read POSTs, but to read the contents of the file above.


Remote Command Execution
------------------------
Also by taking advantage of the Administrative Access Vulnerability,
instead of an attacker changing the guestbook entry file path to
something such as /etc/password to read that files contents, an
attacker can insert /path/file;<cmd> <args>| resulting in the
execution of the cmd at the end of /path/file.

EXAMPLE: /etc/passwd;touch /tmp/hacked|


Arbitrary HTML Insertion / Script Injection Vulnerabilities
-----------------------------------------------------------
Due to improper filtering, all the scalars below allow the insertion
of HTML tags, making guestbook.cgi vulnerable to script injection.

Even though the gbadmin.cgi offers the option to not allow HTML tags
in the $comment field, HTML tags are still accepted.

sub process_input {
# process variables
$name = "$in{'name'}";
$email = "$in{'email'}";
$refer = "$in{'refer'}";
$msn = "$in{'msn'}";
$aol = "$in{'aol'}";
$guest_site = "$in{'guest_site'}";
$comment = "$in{'comment'}";
$ip = "$in{'ip'}";
&validate_input;


Plain Text Administrative Password
----------------------------------
The administrative password can be found in the gbpass.pl file
also found in the same directory as the rest of the guestbook.
Combine the permissions recommended by the author in "readme.txt"
and the plain text password, any "local" users can view the plain
text password found in gbpass.pl.


------------------------------------------------------
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close