More Critical Vulnerabilities In PHP Topsites

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




Version: All
Script: edit.php
vendor: itop10.net
Type: Code Injection/Execution Vulnerability
---------------------------------------------------------------------------
Another critical vulnerability has been found by the CyberArmy Security 
Research Team that effects php topsites. Basically, it is a different 
script vulnerable to the same attack as the previously released add.php 
vuln. A user cannot submit a site with invalid metacharacters if a php 
topsites owner or admin has applied the patch, or written an ereg himself 
or used the htmlspecialchars() function etc. However once accepted a 
malicious user can edit thier site description and then submit the site 
for revalidation. Upon viewing the site submitted for revalidation, any 
code injected into the description field (or other fields) will be run by 
the admin unknowingly.


Version: All
Script: edit.php
vendor: itop10.net
Type: SQL Injection/User Account Disclosure Vulnerability
---------------------------------------------------------------------------
PHP Topsites has a very poor authentication system, thus by adding the 
variable auth=1 and terminating the SQL query with the -- characters an 
attacker can gain access to any user account he/she has an account number 
for. You can TRY to quickly patch this by specifying a refferer and method 
type, but it's advised to just get another topsites script since there
is no real fix for this that would be very secure. Below is an example of 
how an attacker can disclose user account info via a malformed url. This 
works even if the previous fix to edit.php was applied.


http://somewebsite.com/topsitesdir/edit.php?
a=pre&submit=&auth=1&sid=thesiteidnumgoeshere--


The writer of the scripts located at http://www.itop10.net really doesn't 
seem to care about keeping his users safe, as he has not issued a warning 
to potential customers as well as existing customers. Nor has he quit 
selling the buggy scripts for 60$ US a pop. I am no lawyer, but isn't
this somewhat illegal? Negligance maybe? Ah well, you guys decide, Im sure 
someone out there is a lawyer. Cheers :)


JeiAr


All credit goes to The CyberArmy Security Research ACAT Team

http://www.security-research.org
http://www.gulftech.org


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux