eGroupWare 1.6.002 and eGroupWare premium line 9.1 – Multiple Vulnerabilities

  • 作者: Nahuel Grisolia
    日期: 2010-03-16
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/11777/
  • Advisory Name: Remote Command Execution in EGroupware
    
    Vulnerability Class: Remote Command Execution
    
    Release Date: 2010-03-09
    
    Affected Applications: Confirmed in EGroupware 1.4.001+.002 and 1.6.001+.002. EGroupware
    
    Premium Line 9.1 and 9.2 is also affected. Other versions may also be affected.
    
    Affected Platforms: Multiple
    
    Local / Remote: Remote
    
    Severity: High – CVSS: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
    
    Researcher: Nahuel Grisolía
    
    Vendor Status: Acknowledged / Fixed.
    
    Reference to Vulnerability Disclosure Policy: http://www.cybsec.com/vulnerability_policy.pdf
    
    Reference to CYBSEC Security Advisories: http://www.cybsec.com/EN/research/default.php
    
    Vulnerability Description:
    
    EGroupware is prone to a remote command execution vulnerability because the software fails to
    adequately sanitize user-supplied input.
    Successful attacks can compromise the affected software and possibly the computer running
    EGroupware.
    
    Proof of Concept:
    
    http://server/egroupware/phpgwapi/js/fckeditor/editor/dialog/fck_spellerpages/spellerpages/serverscripts/
    spellchecker.php?aspell_path=cat%20/etc/passwd%20%3E%20/tmp/passwd;
    
    Parameter spellchecker_lang is also affected.
    
    Impact:
    
    Direct execution of arbitrary code in the context of Webserver user.
    
    Solution: Fixed in EGroupware version 1.6.003, EPL-9.1.20100309 and EPL-9.2.20100309
    
    Vendor Response:
    
    Feb 5, 2010 - CYBSEC first notification
    Feb 8, 2010 between Mar 7, 2010 – Multiple contacts.
    Mar 9, 2010 – Vendor released fixed versions.
    Mar 9, 2010 – Vulnerability is published.
    
    Advisory Name: Reflected Cross-Site Scripting (XSS) in EGroupware
    
    Vulnerability Class: Reflected Cross-Site Scripting (XSS)
    
    Release Date: 2010-03-09
    
    Affected Applications: Confirmed in EGroupware 1.4.001+.002 and 1.6.001+.002. EGroupware
    Premium Line 9.1 and 9.2 is also affected. Other versions may also be affected.
    
    Affected Platforms: Multiple
    
    Local / Remote: Remote
    
    Severity: Medium – CVSS: 5 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
    
    Researcher: Nahuel Grisolía
    
    Vendor Status: Acknowledged / Fixed.
    
    Reference to Vulnerability Disclosure Policy: http://www.cybsec.com/vulnerability_policy.pdf
    
    Reference to CYBSEC Security Advisories: http://www.cybsec.com/EN/research/default.php
    
    Vulnerability Description:
    
    A reflected Cross Site Scripting vulnerability was found in EGroupware, because the application fails
    to sanitize user-supplied input. The vulnerability can be triggered by any user.
    
    Proof of Concept:
    
    Working on Mozilla Firefox 3.5.7:
    http://server/egroupware/login.php?
    lang="%20style="width:100%;height:100%;display:block;position:absolute;top:0px;left:0px"%20onM
    ouseOver="alert(document.cookie)
    
    Impact:
    
    An affected user may unintentionally execute scripts or actions written by an attacker. In addition, an
    attacker may obtain authorization cookies that would allow him to gain unauthorized access to the
    application.
    
    Solution: Fixed in EGroupware version 1.6.003, EPL-9.1.20100309 and EPL-9.2.20100309
    
    Vendor Response:
    
    Feb 5, 2010 - CYBSEC first notification
    Feb 8, 2010 between Mar 7, 2010 – Multiple contacts.
    Mar 9, 2010 – Vendor released fixed versions.
    Mar 9, 2010 – Vulnerability is published.
    
    Contact Information:
    
    For more information regarding the vulnerability feel free to contact the researcher at
    ngrisolia <at> cybsec <dot> com
    About CYBSEC S.A. Security Systems
    Since 1996 CYBSEC S.A. is devoted exclusively to provide professional services specialized in
    Computer Security. More than 150 clients around the globe validate our quality and professionalism.
    To keep objectivity, CYBSEC S.A. does not represent, neither sell, nor is associated with other
    software and/or hardware provider companies.
    Our services are strictly focused on Information Security, protecting our clients from emerging security
    threats, maintaining their IT deployments available, safe, and reliable.
    Beyond professional services, CYBSEC is continuously researching new defense and attack techniques
    and contributing with the security community with high quality information exchange.
    For more information, please visit www.cybsec.com
    (c) 2010 - CYBSEC S.A. Security Systems