exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

FS-05-01.txt

FS-05-01.txt
Posted Nov 12, 2005
Authored by Toni Koivunen | Site fitsec.com

phpAdsNew version 2.0.6 has a path disclosure flaw.

tags | advisory
SHA-256 | 56c2fc37e464c82994ec9a40d179b04a0cae14f824ac24ca0a6cabe18cffb338

FS-05-01.txt

Change Mirror Download
_________________________________________
Security Advisory
_________________________________________
http://www.fitsec.com/advisories
_________________________________________

Severity: Low/Medium
Title: Multiple vulnerabilities in phpAdsNew
Date: 10.11.2005
ID: FS-05-01
Author: Toni Koivunen (toni.koivunen (at) fitsec.com)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis:

phpAdsNew has a path disclosure vulnerability which allows a potential
attacker to learn the path where phpAdsNew is installed

Background:

phpAdsNew is a banner management and tracking system written in PHP.

Affected versions:

Atleast 2.0.6, most likely others versions also.

Description:

Vuln 1:
Full Path Disclosure in create.php

If user can access the misc/revisions/create.php, the script will
echo the whole installation path to the user:
"Starting scan at /var/www/mysite/html/ads"
If the revision script completes successfully, the user can then
try to access libraries/defaults/revisions.txt, which will then
reveal all files and their revisions and hashes, thus furthermore
revealing all files that have been manually modified by the site admin.

The revisions.txt will also reveal any file that has been added under
the installation tree, unless it's hidden (starts with '.')

Vuln 2:
Full Path Disclosures in the following files (Just by accessing with browser)

admin/lib-updates.inc.php
admin/lib-targetstats.inc.php
admin/lib-size.inc.php
admin/lib-misc-stats.inc.php
admin/lib-hourly-hosts.inc.php
admin/lib-hourly.inc.php
admin/lib-history.inc.php
admin/graph-daily.php

Vuln 3:
SQL-injection in logout.php / lib-sessions.inc.php

phpAdsNew doesn't properly validate the sessionID it receives from
cookie when it tries to log out the user. And it doesn't even check
if the user if really logged in in the first place, thus allowing
unauthorized users to feed data into the SQL-query that's supposed to
clean the phpads_session -table.
Take into note though that this requires magic_quotes_gpc to be off.


Impact:

A remote attacker could exploit this to learn installation paths on
server, as well as to locate new files and possible manually modified
files.

If magic_quotes_gpc is off, a remote attacker can also compromise the
integrity of the database.

Solution:

Update to the newest version


Acknowledgements:
To the community at dievo.org, keep it up :)

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close