|
COMMAND Dynamic Guestbook cross site scripting and arbitrary command execution vulnerabilities SYSTEMS AFFECTED Dynamic Guestbook V3.0 PROBLEM Florian Hobelsberger (BlueScreen) [http://www.it-checkpoint.net] found following : Dynamic Guestbook V3.0 doesn\'t check for bad user input (like PHP-Code or Java Scripts). Under certain circumstances it is possible to execute arbitrary commands on the server. DETAILS ======= As you can see, in this script which is used to write the user input into a file (usually gb.data) the input is not tested for Cross Site Scripting or any malicious characters. ###################### quote source ############################ ##### Öffnen der Datei um zu lesen ##### open (GBDB, $in{gbdaten}); @inhalt = <GBDB>; close (GBDB); ##### Eintrag an den Anfang des Files schreiben ##### chomp($date); open (GBDB, \">>$gbdaten\") || print \"Konnte nicht in $gbdaten schreiben\"; print GBDB \"$in{name}:|:$in{mail}:|:$date:|:$ENV{\'REMOTE_ADDR\'}:|:$in{kommentar}\\n\"; foreach $zeile (@inhalt) { print GBDB $zeile; } close (GBDB); ################### /quote ########################## IMPACT ====== Commands can possibly executed with the rights of the current user. Also, Cross Site Scripting is possible. EXPLOIT ======= A proof of concept exploit will be released in an updated Advisory in the end of April at http://www.it-checkpoint.net/advisory/7.html SOLUTION Nothing yet.