ACollab – Multiple Vulnerabilities

  • 作者: AmnPardaz
    日期: 2010-08-14
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/14640/
  • ##########################www.BugReport.ir########################################
    #
    #AmnPardaz Security Research Team
    #
    # Title:		ACollab Multiple Vulnerabilities
    # Vendor:		http://www.atutor.ca/acollab
    # Vulnerable Version:	1.2 (Latest version till now)
    # Exploitation:		Remote with browser
    # Fix:					N/A
    ###################################################################################
    
    ####################
    - Description:
    ####################
    
    ACollab as described by its vendor is an accessible, open source,
    multi-group, Web-based collaborative
    work environment. ACollab is available as a standalone collaborative
    work environment that will run on
    its own. ACollab is ideal for groups working at a distance developing
    documentation, collaborating on
    research, or writing joint papers.
    
    
    ####################
    - Vulnerability:
    ####################
    
    +--> SQL Injection
    	All of the parameters are sanitized correctly before being used in
    SQL queries else of
    	the POST parameters 'login' and 'password' in the "sign_in.php" page.
    These parameters
    	can be used for injecting arbitrary SQL queries; the 'login'
    parameter is single quoted
    	and the 'password' parameter is single parenthesized, single quoted.
    
    +--> Authentication Bypass
    	The ACollab CMS uses two mechanism for authentication. One for master
    admin user which is
    	based on a hard coded username/password initialized in the
    installation process. And a DB-based
    	authentication for all other users, including the group
    administrators which can add/remove/edit
    	all posts and news and ... from forums and first screen of the
    website. The second authentication
    	mechanism can be bypassed.
    
    ####################
    - Exploits/PoCs:
    ####################
    
    +--> Exploiting The (MySQL) SQL Injection Vulnerability:
    	Go to the sign in page at "victim.net/ACollab/sign_in.php" and use
    the following vectors for injecting
    	your desired SQL query, namely $Q:
    	- In the Username field (login POST parameter): ' or $Q or ''='
    	- In the Password field (password POST parameter): ') or $Q or (''='
    
    +--> Exploiting The Authentication Bypass Vulnerability:
    	You can login as anyone of the registered users of ACollab CMS by
    providing following vector
    	as username and nothing as password:
    	'or''='' limit 1 offset 0 -- '
    	Above vector will log you as the first user according to its member
    id order. You can login as other
    	users, searching for a group administrator account, by following vectors:
    	'or''='' limit 1 offset 0 -- '
    	'or''='' limit 1 offset 1 -- '
    	'or''='' limit 1 offset 2 -- '
    	....
    
    ####################
    - Solution:
    ####################
    
    Add the following command
     $_POST['login'] = addslashes ($_POST['login']);
    $_POST['password'] = addslashes ($_POST['password']);
    at the line 46 of 'sign_in.php' file.
    
    ####################
    - Original Advisory:
    ####################
    
    http://www.bugreport.ir/index_72.htm
    
    ####################
    - Credit:
    ####################
    AmnPardaz Security Research & Penetration Testing Group
    Contact: admin[4t}bugreport{d0t]ir
    www.BugReport.ir
    www.AmnPardaz.com