what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

IdealBBASP.txt

IdealBBASP.txt
Posted May 9, 2006
Authored by CodeScan Labs

IdealBB ASP Bulletin Board versions 1.5.4a and below suffer from file reading, file upload, and cross site scripting flaws.

tags | advisory, xss, asp, file upload
SHA-256 | 7fcc9d4b17811aa2b9759b668c666de7be25b522adfcc2632cfcfd19d30a59b2

IdealBBASP.txt

Change Mirror Download
========================================================================
= CodeScan Advisory, codescan.com <advisories@codescan.com>
=
= Multiple Vulnerabilities In IdealBB ASP Bulletin Board
=
= Vendor Website:
= http://www.idealscience.com
=
= Affected Version:
= Version 1.5.4a And Earlier
=
= Researched By
= CodeScan Labs <advisories@codescan.com>
=
= Public disclosure on May 8th, 2006
========================================================================

== Overview ==

CodeScan Labs (www.codescan.com), has recently released a new source
code scanning tool, CodeScan. CodeScan is an advanced auditing tool
designed to check web application source code for security vulnerabilities.
CodeScan utilises an intelligent source code parsing engine, traversing
execution paths and tracking the flow of user supplied input.

During the ongoing testing of CodeScan ASP, IdealBB ASP Bulletin Board
was selected as one of the test applications.

This advisory is the result of research into the security of IdealBB,
based on the report generated by the CodeScan tool.

== Vulnerability Details ==

* File Reading *

A vulnerability leading to the viewing of any file under the web root
was discovered. The vulnerable code syntax is a call to the OpenTextFile
method of the Scripting.FileSystemObject with user supplied input passed
as the file to read.

* File Uploading *

Four file uploading vulnerabilities were discovered, allowing a remote
user to upload files containing ASP code.

One of the vulnerable instances attempts to check that the extension is
of an allowed type. It does this by checking the extension against a
list of known good. While the list does not include the .asp extension
it does include .asa. This means a user can upload a file with a .asa
extension that contains ASP scripting that will be executed when the
uploaded file is accessed.

All of the instances are vulnerable to the ASP Null Byte problem as
documented in
http://www.security-assessment.com/Whitepapers/0x00_vs_ASP_File_Uploads.pdf

All the instances use code similar to that shown below to validate the
extension against a list of allowed.

[ Start Pseudo Code ]

theExtension = right(sFileName, len(sFileName) - instrrev(sFileName, "."))
bFileExtensionIsValid = false 'assume extension is bad
for each sFileExt in oProps.extensions
if ucase(sFileExt) = ucase(sFileExtension) then
'if the extensions match, it's good. stop checking
bFileExtensionIsValid = True
exit for
end if
next

[ End Pseudo Code ]

The CreateTextFile method of the Scripting.FileSystemObject is then used
to write the contents of the upload to a file.

* SQL Injection *

More than 50 SQL Injection vulnerabilities were located during the CodeScan
analysis. Most of these were caused due to unfiltered user supplied input
appended directly to calls to stored procedures.

[ Start Pseudo Code ]

SQLstr = "sp_someStoredProc " & ID
record.Open SQLstr,DB_CONNECTION,0,1

[ End Pseudo Code ]

In some cases the user supplied input was passed through a function used
to escape the ' character. Exploitation was still possible though as
the concatenated SQL string did not place the input inside quotes.

[ Start Pseudo Code ]
function validateInput(theString)
theString = replace(theString, "'", "''")
..
end function

SQLstr = "sp_anotherStoredProc " & validateInput(ID)
record.Open SQLstr,DB_CONNECTION,0,1

[ End Pseudo Code ]


* Cross Site Scripting *

Numerous cross site scripting vulnerabilities were discovered where
user supplied input was outputted directly back to the browser.

== Solutions ==

CodeScan Labs has been in contact with the vendor and a new version
of the software has been released to address a number of the discovered
vulnerabilities.

Users are advised to upgrade to the latest version from
http://www.idealscience.com

== Credit ==

Discovered and advised to the vendor by CodeScan Labs

== About CodeScan Labs Ltd ==

CodeScan Labs is a specialist security research and development
organisation, that has developed the cornerstone application, CodeScan.
CodeScan Labs helps organisations secure their web services through the
automated scanning of the web application source code for security
vulnerabilities. The CodeScan product is currently available for ASP
and PHP(Beta)

CodeScan Labs operates with Responsible Disclosure. As a result,
any published advisories will contain information around problems
identified by CodeScan, that have been resolved by the vendor.Additional
code problems which may be identified by CodeScan or its staff which are
not resolved by the vendor will not be made publicly available.





e-mail protected and scanned by Bizo Email Filter - powered by Advascan


Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close