Wordpress Cart66 Plugin 1.5.1.14 Multiple Vulnerabilities

2013-10-11 Thread jsibley1
# Exploit Title: Wordpress Cart66 Plugin 1.5.1.14 Multiple Vulnerabilities
# Exploit Author:absane
# Blog:  http://blog.noobroot.com
# Discovery date:September 29th 2013
# Vendor notified:   September 29th 2013
# Vendor fixed:  October 2 2013
# Vendor Homepage:   http://cart66.com
# Software Link: 
http://downloads.wordpress.org/plugin/cart66-lite.1.5.1.14.zip
# Tested on: Wordpress 3.6.1
# Google-dork:   inurl:/wp-content/plugins/cart66
# CVE (CSRF):CVE-2013-5977
# CVE (XSS): CVE-2013-5978

Two vulnerabilities were discovered in the Wordpress plugin Cart66 version 
1.5.1.14.

Vulnerabilities:
1) XSS (Stored)
2) CSRF


VULNERABILITY #1
***
*** Stored XSS  ***
***
Page affected: 
http://[victim_site]/wordpress/wp-admin/admin.php?page=cart66-products in the 
following input fields:
* Product name
* Price description


Proof of Concept

In the vulnerable fields add alert(0) 

The product name XSS vuln is particiularly dangerous because an attacker can 
use the CSRF vulnerability to add a product whose 

name is a malicious script. All the admin user needs to do is view the product 
to be attacked.


//
\\


VULNERABILITY #2

*** CSRF ***

Page affected: 
http://[victim_site]/wordpress/wp-admin/admin.php?page=cart66-products

If the Wordpress admin were logged in and clicked on a link hosting code 
similar to the one in the PoC, then the admin may 

unknowingly add a product to his site or have an existing product altered. 
Other possibilities include, but are not limited 

to, injecting code into a field vulnerable to stored XSS (see the second 
vulnerability).


Proof of Concept

Host this code on a remote wesbserver different from the Wordpress site that 
uses Cart66. As an authenticated Wordpress admin 

user visit the page and add what you will to the fields. A new product is 
added. In a live attack, the fields will be hidden, 

prefilled, and some javascript code will auto submit the fields.



http://192.168.196.135/wordpress/wp-admin/admin.php?page=cart66-products";
 method="post" 

enctype="multipart/form-data" id="products-form">








 





document.csrf_form.submit();



][
]..SOLUTIONS.[
][

Grab the latest update! Or... 

XSS

In products.php, replace the line:
$product->setData($_POST['product']);

with:
$product->setData(Cart66Common::postVal('product'));

CSRF

In products.php, replace the following:


  
  
  


with:


  
  
  
  


And, in Cart66Product.php replace the validate() function with:

  public function validate() {
$errors = array();

if(!wp_verify_nonce($_POST['cart66_product_nonce'], 
'cart66_product_nonce')) {
  $errors['nonce'] = __("An unkown error occured, please try again 
later","cart66");
}
else {
  // Verify that the item number is present
  if(empty($this->item_number)) {
$errors['item_number'] = __("Item number is required","cart66");
  }

  if(empty($this->spreedlySubscriptionId))  {
$this->spreedlySubscriptionId = 0;
  }

  // Verify that no other products have the same item number
  if(empty($errors)) {
$sql = "SELECT count(*) from $this->_tableName where item_number = %s 
and id != %d";
$sql = $this->_db->prepare($sql, $this->item_number, $this->id);
$count = $this->_db->get_var($sql);
if($count > 0) {
  $errors['item_number'] = __("The item number must be 
unique","cart66");
}
  }

  // Verify that if the product has been saved and there is a download path 
that there is a file located at the path
  if(!empty($this->download_path)) {
$dir = Cart66Setting::getValue('product_folder');
if(!file_exists($dir . DIRECTORY_SEPARATOR . $this->download_path)) {
  $errors['download_file'] = __("There is no file available at the 
download path:","cart66") . " " . $this-

>download_path;
}
  }
}

return $errors;
  }


[SECURITY] [DSA 2777-1] systemd security update

2013-10-11 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2777-1   secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
October 11, 2013   http://www.debian.org/security/faq
- -

Package: systemd
Vulnerability  : several
Problem type   : local
Debian-specific: no
CVE ID : CVE-2013-4327 CVE-2013-4391 CVE-2013-4394
Debian Bug : 725357

Multiple security issues in systemd have been discovered by Sebastian
Krahmer and Florian Weimer: Insecure interaction with DBUS could lead
to the bypass of Policykit restrictions and privilege escalation or
denial of service through an integer overflow in journald and missing 
input sanitising in the processing of X keyboard extension (XKB) files.

For the stable distribution (wheezy), these problems have been fixed in
version 44-11+deb7u4.

For the unstable distribution (sid), these problems will be fixed soon.

We recommend that you upgrade your systemd packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.15 (GNU/Linux)

iEYEARECAAYFAlJYC00ACgkQXm3vHE4uylqP0QCggy1xmkp9L6xnWIzGIuRZJkrW
o+0AnRxAff3nQCd5ODf0zHotb0psWR+t
=jf81
-END PGP SIGNATURE-



[SECURITY] [DSA 2776-1] drupal6 security update

2013-10-11 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2776-1   secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
October 11, 2013   http://www.debian.org/security/faq
- -

Package: drupal6
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2012-0825 CVE-2012-0826 CVE-2012-5651 CVE-2012-5652 
 CVE-2012-5653 CVE-2013-0244 CVE-2013-0245

Multiple vulnerabilities have been been fixed in the Drupal content 
management framework, resulting in information disclosure, insufficient 
validation, cross-site scripting and cross-site request forgery.

For the oldstable distribution (squeeze), these problems have been fixed in
version 6.28-1.

For the stable distribution (wheezy), these problems have already been
fixed in the drupal7 package.

For the unstable distribution (sid), these problems have already been
fixed in the drupal7 package.

We recommend that you upgrade your drupal6 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.15 (GNU/Linux)

iEYEARECAAYFAlJYCuAACgkQXm3vHE4uylpS1QCgmNWsbjCfH7c7b1yTulGtmiM/
Cu4AoJdlHSvDBwWF92tdhZ5uj2pEPUrR
=02um
-END PGP SIGNATURE-