exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

syscpExec.txt

syscpExec.txt
Posted Aug 10, 2005
Authored by Christopher Kunz | Site hardened-php.net

SysCP versions 1.2.10 and below suffer from a remote code execution flaw.

tags | advisory, remote, code execution
SHA-256 | 74f93ac0c8e698e8488ceaa69c829fad95c392171617215ab0f11272340044e7

syscpExec.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hardened PHP Project
www.hardened-php.net


-= Security Advisory =-


Advisory: Remote code execution in SysCP
Release Date: 2005/08/09
Last Modified: 2005/08/08
Author: Christopher Kunz <christopher.kunz@hardened-php.net>
Application: SysCP 1.2.10 and prior
Severity: Arbitrary remote code execution
Risk: Critical
Vendor Status: Vendor has released an updated version
References: http://www.hardened-php.net/advisory_132005.64.html


Overview:

SysCP is a server management application, similar to the popular Confixx and
CPanel products - but open source. It is deployed by several large german
hosting and co-location companies and can be used for complete server admin-
istration, including web and database, FTP and mail servers, reseller access
and more.
With the PHP configuration flag "register_globals On" (which is still the
case for a large installation base), a number of variables can be injected,
leading to the execution of arbitrary remote code, which can also be inclu-
ded from a remote server. This can lead to backdooring of the server in
question.
SysCP needs the MySQL root password to perform some of its functionality, so
attackers can very easily obtain this critical information from SysCP's con-
figuration file.



Details:

During a rough scan through the SysCP source code, we found two possibili-
ties to inject global variables via GET - experience shows that probably
more occurances exist.
The first of these holes allows direct inclusion of remote PHP code with
just one GET parameter. By setting the language to any value not existant
in the SysCP installation, inclusion of a language file can be forced -
there are no checks if the included file was actually user-supplied.
The second vulnerability allows passing curly brackets to SysCP's internal
template engine which then eval()s this expression. A string like
{${phpinfo();}} would then be evaluated to the phpinfo() function, which
would subsequently be executed.


Proof of Concept:

Due to the sensitive nature of the vulnerability, the Hardened PHP Project
is not going to release a proof of concept to the public.


Disclosure Timeline:

18. July 2005 - Initial vendor contact.
23. July 2005 - PoC disclosed to vendor.
04. August 2005 - Vendor has released updated version.
09. August 2005 - public disclosure


Recommendation:

All of these vulnerabilities could have been mitigated by using our
Hardening Patch for PHP [1], which includes protection against URL includes
as well as eval() function protection.
Apart from that, the vendor has released an updated version that add-
resses the issue [2].

Plug:

You can discuss this and other vulnerabilities in our forum at
http://forum.hardened-php.net/ - an up-to-date list of advisories can be
found at http://www.hardened-php.net/.


Links:

[1] http://www.hardened-php.net/downloads.13.html
[2] http://www.syscp.de/forum/viewtopic.php?t=1772


GPG-Key:

http://www.hardened-php.net/hardened-php-signature-key.asc

pub 1024D/0A864AA1 2004-04-17 Hardened-PHP Signature Key
Key fingerprint = 066F A6D0 E57E 9936 9082 7E52 4439 14CC 0A86 4AA1


Copyright 2005 Christopher Kunz / Hardened PHP Project. All rights reserved.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQFC9zaIRDkUzAqGSqERArfZAKDXgmFdPQSONdLNXFNhMqApTYqUIwCgxzjb
T/i48IH5hId5eOLuXvWaVY0=
=KSeh
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close