what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

azbb1007d.txt

azbb1007d.txt
Posted Jun 1, 2005
Authored by James Bercegay | Site gulftech.org

AZBB versions 1.0.07d and below suffer from arbitrary file deletion and enumeration flaws.

tags | advisory, arbitrary
SHA-256 | 6306c8d12777015f47460895fa5507cfd12177435797106e750bf523bbff3697

azbb1007d.txt

Change Mirror Download


##########################################################
# GulfTech Security Research April 19th, 2005
##########################################################
# Vendor : AZBB
# URL : http://azbb.cyaccess.com/
# Version : AZBB 1.0.07d && Earlier
# Risk : Multiple Vulnerabilities
##########################################################



Description:
azbb is a forum that was written with a primary focus on
security. azbb does not require a database such as MySQL,
PostGres or MSSQL and can even be used as a blog, or portal of
sorts. Unfortunately there are a number of security issues in AZBB
versions prior to 1.0.08, but none of these issues are considered
"high risk". However, the developer has addressed these issues and
all users should upgrade to the current 1.0.08 version.



File Inclusion:
There is a file inclusion vulnerability in AZBB 1.0.07a - 1.0.07c
that is the result of missing code that is present in all of the
other AZBB versions. This file inclusion issue poses a different
risk level depending on your server configuration. Lets have a
look at the code in question. @ /azbb_center/source/main_index.php

########## Get the Abstraction Layer
$inc = $dir_src.'/'.$abs_layer.'_db_ops.php';
file_exists($inc) ? include($inc) : exit('Unable to open '.$inc);

Since the "AZBB KEY CHECK" that exists in other pages is missing
from this page we can influence both the $dir_src and $abs_layer
variables if register globals is on. However, what we can do with
this greatly depends on the server configuration, and this is a
result of the file_exists() function being used. You can read
more about this in the official php manual located here
http://us2.php.net/file_exists



Arbitrary File Deletion:
There is an issue in AZBB that could allow for an attacker logged
in as an admin, or a malicious admin to delete arbitrary files
outside the scope of the application. The vulnerable code is in
admin_avatar.php and admin_attachment.php Lets have a look at the
code in admin_avatar.php

## trim all and delete
foreach ($_POST['avat_select'] as $ent)
{
if (file_exists($dir_avatar.'/'.$ent))
{ unlink($dir_avatar.'/'.$ent); }
}

As we can see there are no checks made for traversal sequences,
and a user with admin privileges could easily delete arbitrary files
on the server. The vulnerability in admin_attachment.php is nearly
identical.



Arbitrary File Enumeration:
There is an issue in AZBB that can be exploited by both users and
guests alike to tell whether or not files on the target server exists.
This is due to a file check coming before the input is cleaned in
attachment.php

elseif (!file_exists($dir_att.'/'.$_POST['attachment'])) {$error =
$txt_err[13];}

This issue can not be used to download arbitrary files, because the
input is cleaned before the file is included, but we can enumerate
files. To check if a file exists on the target web server all an
attacker has to do is modify the "attachment" parameter to include
traversal sequences. If the file exists we will be prompted with a
download, and if it doesn't exists we will see an error message.



Solution:
The developer of AZBB was very quick to respond and has addressed
these issues. A complete change log can be seen by following the
url posted below. Also, you will find the link to the updated AZBB
1.0.08 downloads below

http://azbb.cyaccess.com/azbb.php?1091778548
http://azbb.cyaccess.com/azbb.php?1091872271

All users are advised to upgrade their azbb installations as soon
as possible. A special thanks to AZ for remedying these issues so
quickly. If everyone responded in this timely of a manner it would
make what we do a lot easier :)



Related Info:
The original advisory can be found at the following location
http://www.gulftech.org/?node=research&article_id=00068-04192005



Credits:
James Bercegay of the GulfTech Security Research Team

--
No virus found in this outgoing message.
Checked by AVG Anti-Virus.
Version: 7.0.308 / Virus Database: 266.9.17 - Release Date: 4/19/2005


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close