exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

waraxe-2004-SA007.txt

waraxe-2004-SA007.txt
Posted Mar 17, 2004
Authored by Janek Vind aka waraxe

Both cross site scripting and SQL injection vulnerabilities exist in the 4nGuestbook version 0.92 module for PHP-Nuke versions 6.5 through 6.9.

tags | exploit, php, vulnerability, xss, sql injection
SHA-256 | f732ec2b913b6d095bd8180dac6ad638b87e3c15c8c333cfdacde98395e7fb6d

waraxe-2004-SA007.txt

Change Mirror Download




{================================================================================}
{ [waraxe-2004-SA#007] }
{================================================================================}
{ }
{ [ XSS and SQL injection bugs in 4nguestbook module for PhpNuke ] }
{ }
{================================================================================}

Author: Janek Vind "waraxe"
Date: 15. March 2004
Location: Estonia, Tartu



Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

>From developer's infofile:

4nGuestbook Version 0.92 (German & English & Finnish) for phpNUKE Version 6.5 - 6.9 (www.phpnuke.org)
By WarpSpeed (Marco Wiesler) (warpspeed@4thDimension.de) @ Sep/2oo3
http://www.warp-speed.de @ 4thDimension.de Networking

With this addon/module for phpNUKE you can offer a comfortable guestbook
to your users.

- Admin: Edit, delete and managing the guestbook entrys
- Admin: Generell Settings from Addon/Module
- Admin: Settings: Allow NB-Code, HTML or Smilies ...
- Admin: Settings: Only Members can post...
- Preview of entry
- Show IP or ID from poster (only for Admin)
- Full Multilanguage support
- And mutch more...



Vulnerabilities:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

1. Cross-Site scripting aka XSS

Example:


http://localhost/nuke71/modules.php?name=4nGuestbook&entry=x[xss%20code%20here]

Because PhpNuke will filter GET request for some symbols, it will be wise to use POST
request for exploiting.

Remark 1 - this XSS case is by standard classification sql injection bug,
but because the script will display mysql errors for any user (not only for admin), we can "convert"
the sql injection to xss.

Remark 2 - when MySql version 4.1 will be widely used in future, then many "not so useful" sql injections,
including this one, can be used with full power - because of the "subselects" feature, not available in
current MySql versions. Why? Because if we can inject malicious code to sql sentence after "ORDER BY" or
after "LIMIT", then in current MySql versions, all we can do, is to fail the sql request. No UNION-s etc.
But in version 4.1 we can have something like this - "ORDER BY desc ASC LIMIT (SELECT pwd FROM nuke_authors)...".



2. Sql injection

Not useful at all in this case, because we must have superadmin rights, but anyway - this bug needs to be fixed...

Example:

http://localhost/nuke71/admin.php?op=NukebookEditEntry&nbid=-2%20UNION%20SELECT%20null%20/*

and we have sql error:

MySQL Error : Query Error
Error Number: 1222 The used SELECT statements have a different number of columns





Greetings:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Greets to ulljobu, djzone, raider and to all IT freaks in Estonia!



Contact:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

come2waraxe@yahoo.com
Janek Vind "waraxe"

---------------------------------- [ EOF ] ------------------------------------
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close