netVigilance Security Advisory #9 Monkey Boards version 0.3.5 Multiple Path Disclosure Vulnerabilities Description: Monkey Boards is a fully-featured message board system suitable for smaller web sites. Build a virtual online community where users can post and reply to anyone. It is coded in PHP and uses an SQLite database. Due to program flaws it is possible for the remote attacker to disclose the true path of the server-side script. External References: Mitre CVE: CVE-2006-6113 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6113 NVD NIST: CVE-2006-6113 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-6113 OSVDB: 30683 http://www.osvdb.com/displayvuln.php?osvdb_id=30683 30684 http://www.osvdb.com/displayvuln.php?osvdb_id=30684 Summary: Monkey Boards is a fully-featured message board system suitable for smaller web sites. Build a virtual online community where users can post and reply to anyone. It is coded in PHP and uses an SQLite database. A security problem in the product allows attackers to gather the true path of the server-side script. Release Date: November 28, 2006 Severity: Risk: Low CVSS Metrics Access Vector: Remote Access Complexity: Low Authentication: not-required Confidentiality Impact: Partial Integrity Impact: None Availability Impact: None Impact Bias: Normal CVSS Base Score: 2.3 Target Distribution on Internet: Low Exploitability: Functional Exploit Remediation Level: Official Fix Report Confidence: Confirmed Vulnerability Impact: Attack Host Impact: Path disclosure. SecureScout Testcase ID: TC 17939 Vulnerable Systems: Monkeyboards 0.3.5 and earlier. Vulnerability Type: Program flaw ? The admin_auth.inc.php and class.compiler.php scripts has flaws which lead to a Warning or even Fatal Errors. Vendor Status: The Vendor has been notified. Project Administrator James Greenwood has released version 0.3.5a that fixes the problems. Please goto : http://sourceforge.net/project/showfiles.php?group_id=165094 to download latest version. Solution: Upgrade to version 0.3.5a or above to remedy this problem. Workaround: Disable warning messages: modify in the php.ini file following line: display_errors = Off. Or modify .htaccess file (this will work only for the apache servers). Example: HTTP REQUEST http://[TARGET]/[monkeyboards-directory]/include/engine/class.compiler.php REPLY ... <!--error--><br /> <b>Fatal error</b>: Class template_lite_compiler: Cannot inherit from undefined class template_lite in <b[FULL PATH TO FILE]class.compiler.php</b> on line <b>27</b><br /> <br /> ... OR HTTP REQUEST http://[TARGET]/[monkeyboards-directory]/include/admin_auth.inc.php REPLY ... <!--error--><br /> <b>Fatal error</b>: Call to undefined function: logged_in() in <b>[FULL PATH TO FILE]admin_auth.inc.php</b> on line <b>3</b><br /> ... URL of Original Advisory: http://www.netvigilance.com/advisory0009 Credits: Jesper Jurcenoks Co-founder netVigilance, Inc www.netvigilance.com