Showing posts with label PHP-code. Show all posts
Showing posts with label PHP-code. Show all posts

Sunday, 10 May 2015

CVE-2015-2214 - NetCat CMS Full Path Disclosure (Information Disclosure) Web Security Vulnerabilities

201402Return-oriented-programming-ROP-computer-security-exploit-technique
CVE-2015-2214 - NetCat CMS Full Path Disclosure (Information Disclosure) Web Security Vulnerabilities
Exploit Title: CVE-2015-2214 NetCat CMS Full Path Disclosure Web Security Vulnerabilities
Product: NetCat CMS (Content Management System)
Vendor: NetCat
Vulnerable Versions: 5.01   3.12   3.0   2.4   2.3   2.2   2.1   2.0   1.1
Tested Version: 5.01   3.12
Advisory Publication: February 27, 2015
Latest Update: May 05, 2015
Vulnerability Type: Information Leak / Disclosure [CWE-200]
CVE Reference: CVE-2015-2214
Impact CVSS Severity (version 2.0):
CVSS v2 Base Score: 5.0 (MEDIUM) (AV:N/AC:L/Au:N/C:P/I:N/A:N) (legend)
Impact Subscore: 2.9
Exploitability Subscore: 10.0
CVSS Version 2 Metrics:
Access Vector: Network exploitable
Access Complexity: Low
Authentication: Not required to exploit
Impact Type: Allows unauthorized disclosure of information
Credit and Writer: Wang Jing [School of Physical and Mathematical Sciences (SPMS), Nanyang Technological University (NTU), Singapore] (@justqdjing)


 
Consultation Details:

 
(1) Vendor & Product Description:
Vendor:
NetCat

 
Product & Version:
NetCat
5.01   3.12   3.0   2.4   2.3   2.2   2.1   2.0   1.1

 
Vendor URL & Download:
NetCat can be accessed from here,

 
Product Introduction Overview:
NetCat.ru is russian local company. "NetCat designed to create an absolute majority of the types of sites: from simple "business card" with a minimum content to complex web-based systems, from corporate offices to online stores, libraries or media data - in other words, projects completely different directions and at any level of complexity. View examples of sites running on NetCat CMS can be in a special section."

"Manage the site on the basis of NetCat can even inexperienced user, because it does not require knowledge of Internet technologies, programming and markup languages. NetCat constantly improving, adds new features. In the process of finalizing necessarily take into account the wishes of our partners and clients, as well as trends in Internet development. More than 2,000 studios and private web developers have chosen for their projects is NetCat, and in 2013 sites, successfully working on our CMS, created more than 18,000."

"We give a discount on any edition NetCat
We try to help our partners to enter into a close-knit team. To reduce your expenses on the development of a new system, we provide special conditions for the acquisition of commercial licenses NetCat, for a partner is assigned a permanent discount of 40%, which according to the results of further sales could be increased to 60%."

"Teach your developers work with the secrets NetCat
In addition to the detailed documentation and video tutorials to new partners we offer a unique free service - direct contact with the developer from the team NetCat, which will help in the development of product development tools."

"We give customers
Once you develop the three sites NetCat information about you appear in our ranking developers. This means that you not only begin to receive direct requests from clients but also become a member of tenders conducted by customers. In addition, if the partner is really good work, employees NetCat begin recommending it to clients requesting assistance in the choice of contractor."

"We will help in the promotion of
The company is a regular participant NetCat large number of forums, seminars and conferences. We are happy to organize together with partners involved, help with advertising materials and share information for the report."

"Confirmed its status in the eyes of customers
We have a very flexible system of certification of partners: we do not give certificates for the sale of licenses and for the developed sites. So, for example, to obtain a certificate "Development of corporate websites' to add to your personal account three implementation of the appropriate type."

 
(2) Vulnerability Details:
NetCat web application has a computer security bug problem. It can be exploited by information leakage attacks - Full Path Disclosure (FPD). This may allow a remote attacker to disclose the software's installation path. While such information is relatively low risk, it is often useful in carrying out additional, more focused attacks.

Several other similar products 0-day vulnerabilities have been found by some other bug hunter researchers before. Netcat has patched some of them. FusionVM Vulnerability Management and Compliance provides sources for the latest info-sec news, tools, and advisories. It has published suggestions, advisories, solutions details related to important vulnerabilities.


(2.1) The first programming code flaw occurs at "&redirect_url" parameter in "netshop/post.php?" page.




 
References:

CVE-2014-9562 OptimalSite Content Management System (CMS) XSS (Cross-Site Scripting) Web Security Vulnerabilities















CVE-2014-9562 OptimalSite Content Management System (CMS) XSS (Cross-Site Scripting) Web Security Vulnerabilities



Exploit Title:  OptimalSite CMS /display_dialog.php image Parameter XSS Web Security Vulnerability
Vendor: OptimalSite
Product: OptimalSite Content Management System (CMS) 
Vulnerable Versions: V.1 V2.4
Tested Version: V.1 V2.4
Advisory Publication: January 24, 2015
Latest Update: January 31, 2015
Vulnerability Type: Cross-Site Scripting [CWE-79]
CVE Reference: CVE-2014-9562
Impact CVSS Severity (version 2.0):
CVSS v2 Base Score: 4.3 (MEDIUM) (AV:N/AC:M/Au:N/C:N/I:P/A:N) (legend)
Impact Subscore: 2.9
Exploitability Subscore: 8.6
CVSS Version 2 Metrics:
Access Vector: Network exploitable; Victim must voluntarily interact with attack mechanism
Access Complexity: Medium
Authentication: Not required to exploit
Impact Type: Allows unauthorized modification
Credit: Jing Wang [School of Physical and Mathematical Sciences, Nanyang Technological University (NTU), Singapore] (@justqdjing)





Suggestion Details:


(1) Vendor & Product Description

Vendor: 
OptimalSite

Product & Version: 
OptimalSite Content Management System (CMS) 
V.1 
V2.4



Vendor URL & Download:
The product can be obtained from here,



Product Description Overview: 
"Content management system OptimalSite is an online software package that enables the management of information published on a website. OptimalSite consists of the system core and integrated modules, which allow expanding website possibilities and functionality. You may select a set of modules that suits your needs best. 

Website page structure

Website page structure is presented in a tree structure similar to Windows Explorer, so that several page levels can be created for each item on the menu.  The website's structure itself can be easily edited: you can create new website pages, delete unnecessary ones, and temporarily disable individual pages.

Website languages

OptimalSite may be used to create a website in different languages, the number of which is not limited. Different information may be presented in each separate language and the structure of pages in each language may also differ. 

WYSIWYG (What You See Is What You Get) text editor

Using this universal text editor makes posting and replacing information on the website effortless.   Even a minimum knowledge of MS Word and MS Excel will make it easy to use the tools of WYSIWYG text editor and implement your ideas. 

Search function in the system

By using search function system’s administrator is able to find any information that is published in administrative environment. It is possible to execute a search in the whole system and in separate its’ modules as well.

Recycle bin function

System administrator is able to delete useless data.  All deleted data is stored in recycle bin, so administrator can restore information anytime. "






(2) Vulnerability Details:
OptimalSite web application has a computer security bug problem. It can be exploited by stored XSS attacks. This may allow a remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.

Several other the similar product 0-day vulnerabilities have been found by some other bug hunter researchers before. OptinalSite has patched some of them. "Openwall software releases and other related files are also available from the Openwall file archive and its mirrors. You are encouraged to use the mirrors, but be sure to verify the signatures on software you download. The more experienced users and software developers may use our CVSweb server to browse through the source code for most pieces of Openwall software along with revision history information for each source file. We publish articles, make presentations, and offer professional services." Openwall has published suggestions, advisories, solutions details related to XSS vulnerabilities.


(2.1) The code programming flaw occurs at "&image" parameter in "display_dialog.php" page.








http://lists.openwall.net/full-disclosure/2015/02/02/3
http://static-173-79-223-25.washdc.fios.verizon.net/?a=139222176300014&r=1&w=2
http://permalink.gmane.org/gmane.comp.security.fulldisclosure/1546
https://zuiyuxiang.wordpress.com/2015/05/10/cve-2014-9562-optimalsite-content-management-system-cms-xss-cross-site-scripting-security-vulnerabilities/
http://frenchairing.blogspot.com/2015/05/cve-2014-9562-optimalsite-content.html
http://tetraph.blog.163.com/blog/static/234603051201541082835108/
https://www.facebook.com/permalink.php?story_fbid=1623045457913931&id=1567915086760302
https://twitter.com/buttercarrot/status/597377286996791299
http://www.weibo.com/5099722551/ChdSxaqGR?ref=home&rid=4_0_1_2669612892358968742&type=comment
https://plus.google.com/113115469311022848114/posts/9mdeMorsS2C
http://ittechnology.lofter.com/post/1cfbf60d_6e93c47
http://itinfotech.tumblr.com/post/118602673596/securitypost-cve-2014-9562-optimalsite-content