BugTraq
Chipmailer <= 1.09 Multiple Vulnerabilities Jun 13 2006 07:46PM
tamriel gmx net
-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

Advisory: Chipmailer <= 1.09 Multiple Vulnerabilities

Release Date: 2006/06/13

Last Modified: 2006/06/13

Author: Tamriel [tamriel at gmx dot net]

Application: Chipmailer <= 1.09

Risk: Medium

Vendor Status: no patch available

Vendor Site: chipmailer.de

Overview:

Quote from http://chipmailer.de

"Der Chipmailer ist ein Paidmail Script der neuesten Generation,

welches mit Attraktiven Vorteilen winkt. Dieses Script hat sehr

viele Funktionen für Benutzer, Sponsoren sowie für Administratoren."

Details:

1) Cross Site Scripting Vulnerabilities in main.php

(arround line 300-310)

...

$sitename = data("sitename");

$name = $_POST['name'];

$betreff = $_POST['betreff'];

$betreff = "Anfrage bei ".$sitename." über ".$betreff."";

$mail = $_POST['mail'];

$adminmail = data("adminmail");

$text = $_POST['text'];

mail($adminmail, $betreff, $text, "From: $name <$mail>");

...

Nothing will be checked so an attacker can send the

site administrator some shit.

In the complete script you can found this vulnerabilities so i

mention only one example here.

2) SQL Injection Vulnerability in main.php

(arround line 335)

...

$anfang = $_GET['anfang'];

$connect = mysql_query("SELECT head, autor, date, text FROM news

order by id desc LIMIT $anfang, 10");

...

3) Public phpinfo() in php.php

(arround line 2)

<?

phpinfo();

?>

In the php.php file, included in the install files from this script

is just a phpinfo() command used, so attackers can easy collect

information about their victims.

4) SQL Injection Vulnerability in main.php

(arround line 30-140)

...

$name = $_POST['name'];

$pass = md5($_POST['pass']);

$passwdh = md5($_POST['passwdh']);

$mail = $_POST['mail'];

$anrede = $_POST['anrede'];

$vorname = $_POST['vorname'];

$nachname = $_POST['nachname'];

$gebtag = $_POST['gebtag'];

$gebmonat = $_POST['gebmonat'];

$gebjahr = $_POST['gebjahr'];

...

mysql_query("INSERT INTO user ( name, pass, mail, ip, status, register, anrede, vorname, nachname,

strasse, hausnr, plz, stadt, land, geb, `int1`, `int2`, `int3`, `int4`, `int5`, `int6`, `int7`,

`int8`, `int9`, `int10`, `int11`, `int12`, `int13`, `int14`, `int15`, `int16`, `int17`,

`int18`, `int19`, `int20`, `int21`, newsletter, werber, paidmails, bespaidmails ) VALUES

( '$name', '$pass', '$mail', '$ip', '2', '$date', '$anrede', '$vorname', '$nachname', '$strasse', '$hausnr',

'$plz', '$stadt', '$land', '$geb', '$int1', '$int2', '$int3', '$int4', '$int5', '$int6', '$int7',

'$int8', '$int9', '$int10', '$int11', '$int12', '$int13', '$int14', '$int15', '$int16', '$int17',

'$int18', '$int19', '$int20', '$int21', '$newsletter', '$werber', '0', '0' )");

...

If magic_quotes_gpc is off, then you can directly inject malicious SQL code.

The same in (for example):

line 1366-1369

line 1519-1520

line 1768-1769

...

Proof of Concept:

index.php?area=news&anfang=0/*

Note:

It is strongly recommended to update your script by yourself.

Check out some other insecure handlings, like the logout handling with not overwrites

the existence cookie.

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.4.3

iD8DBQFEjyQrqBhP+Twks7oRArnAAKCS99/tPofih3VT5r7rEPS3wcq5oQCfckFN

4uKl2tTrA802OsBlya53Vj8=

=d7Dx

-----END PGP SIGNATURE-----

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus