exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

AsbruHardCore.txt

AsbruHardCore.txt
Posted Oct 20, 2006
Authored by n.runs GmbH | Site nruns.com

Asbru HardCore Web Content Editor is vulnerable to a command injection attack vulnerability.

tags | advisory, web
SHA-256 | 8faebc3ebb744f5e464d9397f86a2bc2f60595c5d0d533faeb33ab4b5e4f44e7

AsbruHardCore.txt

Change Mirror Download
________________________________________________________________________

n.runs GmbH
http://www.nruns.com/ security@nruns.com
n.runs-SA-2006.001 15-Oct-2006
________________________________________________________________________

Vendor: Asbru Software, http://asbrusoft.com
Product: Asbru HardCore Web Content Editor,
http://editor.asbrusoft.com/
Vulnerability: Command Injection

________________________________________________________________________

Vendor communication:

2006/10/05 initial notification of AsbruSoft
2006/10/08 fix was created over the weekend, released
on Oct 8.
________________________________________________________________________

Overview:

The Asbru Software Web Content Editor allows for web-based advanced text
processing, replacing the typical TEXTAREA input fields with a rich user
interface,
offering HTML editing capabilities, formatting and various other features.
It integrates with Asbru Software's Content Management System, works with
most modern browsers and comes in versions for ASP, ASP.NET, PHP,
ColdFusion and JSP.

Description:
The spell checking feature uses ASpell, which is invoked through the
respective
language's process creation commands, such as proc_open() in PHP, Runtime's
exec() method in JSP, shell.Run() in ASP and the like. All these
invocations are
prone to a command injection attack, since ASpell's dictionary argument is
specified from a HTTP request parameter and the input is not sanitized.
This leads to immediate shell command execution if an attacker carefully
crafts this parameter's value. The vulnerability is *only* present if the
spell checking capability is in use.

Solution:
AsbruSoft reacted very quickly. The vulnerability was reported on Oct 5 and
a
fix was created over the weekend, released on Oct 8. The updated version
6.0.22 is available from
http://editor.asbrusoft.com/page.php/id=727.
________________________________________________________________________

Credit:
Bug found by Jan Muenther of n.runs GmbH. Thanks
________________________________________________________________________

References: None
________________________________________________________________________

The information provided is released by n.runs "as is" without warranty
of any kind. n.runs disclaims all warranties, either express or implied,
expect for the warranties of merchantability. In no eventshall n.runs be
liable for any damages whatsever including direct, indirect, incidental,
consequential, loss of business profits or special damages, even if
n.runs has been advised of the possibility of such damages.
Distribution or Reproduction of the information is provided that the
advisory is not modified in any way.

Copyright 2006 n.runs. All rights reserved. Terms of use.
________________________________________________________________________

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close