{"id":12805,"date":"2005-12-06T11:06:49","date_gmt":"2005-12-06T11:06:49","guid":{"rendered":"http:\/\/gaisan.com\/blogs\/?p=12805"},"modified":"2005-12-06T11:06:49","modified_gmt":"2005-12-06T11:06:49","slug":"fw-what-happened-on-taht-site","status":"publish","type":"post","link":"http:\/\/gaisan.com\/blogs\/?p=12805","title":{"rendered":"FW: what happened on taht site"},"content":{"rendered":"<p>\/\/=============================<br \/>\n\/\/ Shane Dempsey<br \/>\n\/\/ Managing Director,<br \/>\n\/\/ Gaisan Technologies Ltd.<br \/>\n\/\/ e: sdempsey@gaisan.com<br \/>\n\/\/ u: http:\/\/www.gaisan.com<br \/>\n\/\/ t: +353 (0)51 304224<br \/>\n\/\/=============================<\/p>\n<p>&#8212;&#8211;Original Message&#8212;&#8211;<br \/>\nFrom: Shane Michael Dempsey [mailto:sdempsey@gaisan.com]<br \/>\nSent: 06 December 2005 10:57<br \/>\nTo: &#8216;whayes@gaisan.com&#8217;<br \/>\nSubject: what happened on taht site<\/p>\n<p>Here&#8217;s the exploit.. <\/p>\n<p>PROGRAM: Moregroupware<br \/>\nHOMEPAGE: http:\/\/www.moregroupware.com\/<br \/>\nVULNERABLE VERSIONS: 0.6.7 and prior ?<br \/>\nRISK: Low\/Medium<br \/>\nIMPACT: Cross Site Scripting<br \/>\nRELEASE DATE: 2003-06-26<\/p>\n<p>=================================================<br \/>\nTABLE OF CONTENTS<br \/>\n=================================================<\/p>\n<p>1&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.DESCRIPTION<br \/>\n2&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;..DETAILS<br \/>\n3&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.EXPLOITS<br \/>\n4&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;SOLUTIONS<br \/>\n5&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;..WORKAROUND<br \/>\n6&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;..DISCLOSURE TIMELINE<br \/>\n7&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;..CREDITS<br \/>\n8&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;..DISCLAIMER<br \/>\n9&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;..REFERENCES<br \/>\n10&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;FEEDBACK<\/p>\n<p>1. DESCRIPTION<br \/>\n=================================================<\/p>\n<p>&#8220;Some of the features that are worth being mentioned:<\/p>\n<p>&#8211; Contact\/address management<br \/>\n&#8211; Webmail<br \/>\n&#8211; full-featured Calendar<br \/>\n&#8211; ToDo management<br \/>\n&#8211; News<br \/>\n&#8211; Project management<br \/>\n&#8211; Some preferences for each module<br \/>\n&#8211; Skins based on Cascading Style Sheets&#8221;<\/p>\n<p>(direct quote from http:\/\/www.moregroupware.com)<\/p>\n<p>2. DETAILS<br \/>\n=================================================<\/p>\n<p>&#8211; Cross Site Scripting :<\/p>\n<p>Many exploitable bugs was found in Moregroupware which cause script<br \/>\nexecution on client&#8217;s computer.<\/p>\n<p>This kind of attack known as &#8220;Cross-Site Scripting Vulnerability&#8221;<br \/>\nis present in many section of the web site, an attacker can input<br \/>\nspecially crafted links and\/or other malicious scripts.<\/p>\n<p>&#8211; Upload files :<\/p>\n<p>When you upload a file on the server you can upload some html files or<br \/>\nphp files. You can grab or change some informations with this<br \/>\npossibility.<\/p>\n<p>3. EXPLOIT<br \/>\n=================================================<\/p>\n<p>&#8211; Cross Site Scripting (many pages are infected) :<\/p>\n<p>http:\/\/[target]\/moregroupware\/modules\/contact\/index.php?<\/p>\n<p>You can add a contact and put , alert(); can be<br \/>\nreplaced by a malicious script.<\/p>\n<p>A dialog box is opened on the client browser.<\/p>\n<p>Impact is relatively low, as this is a closed group application.<br \/>\nPeople having access should be &#8216;trustable&#8217;.<\/p>\n<p>&#8211; Upload files :<\/p>\n<p>You can upload a file like file.php:<\/p>\n<p>And access it directly :<br \/>\nhttp:\/\/[target]\/moregroupware\/modules\/files\/store\/file.php<\/p>\n<p>This file is executed on the server and the information is divulged<br \/>\nto the hacker.<\/p>\n<p>4. SOLUTIONS<br \/>\n=================================================<\/p>\n<p>&#8211; Cross Site Scripting :<br \/>\nUse the function php eregi_replace to filter the input data.<\/p>\n<p>5. WORKAROUND<br \/>\n=================================================<\/p>\n<p>&#8211; Upload files :<br \/>\nSecure this module by replacing file extension or specify to the web<br \/>\nserver not to execute this files. A better way for this problem is<br \/>\nto set permissions on the store\/directory so that only the webserver can<br \/>\nread the files. A simple fix that actually works.<\/p>\n<p>this wasn&#8217;t done&#8230;<\/p>\n<p>6. DISCLOSURE TIMELINE<br \/>\n=================================================<\/p>\n<p>06\/20\/2003 Vendor notified<br \/>\n06\/24\/2003 Response from the vendor and corrections added<br \/>\n06\/25\/2003 Security Corporation clients notified<br \/>\n06\/26\/2003 Public disclosure<\/p>\n<p>7. CREDITS<br \/>\n=================================================<\/p>\n<p>Discovered by Fran?ois SORIN <\/p>\n<p>8. DISLAIMER<br \/>\n=================================================<\/p>\n<p>The information within this paper may change without notice. Use of<br \/>\nthis information constitutes acceptance for use in an AS IS condition.<br \/>\nThere are NO warranties with regard to this information. In no event<br \/>\nshall the author be liable for any damages whatsoever arising out of<br \/>\nor in connection with the use or spread of this information. Any use<br \/>\nof this information is at the user&#8217;s own risk.<\/p>\n<p>9. REFERENCES<br \/>\n=================================================<\/p>\n<p>&#8211; http:\/\/www.security-corporation.com\/articles-20030626-003.html<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\/\/============================= \/\/ Shane Dempsey \/\/ Managing Director, \/\/ Gaisan Technologies Ltd. \/\/ e: sdempsey@gaisan.com \/\/ u: http:\/\/www.gaisan.com \/\/ t: +353 (0)51 304224 \/\/============================= &#8212;&#8211;Original Message&#8212;&#8211; From: Shane Michael Dempsey [mailto:sdempsey@gaisan.com] Sent: 06 December 2005 10:57 To: &#8216;whayes@gaisan.com&#8217; Subject: what happened on taht site Here&#8217;s the exploit.. PROGRAM: Moregroupware HOMEPAGE: http:\/\/www.moregroupware.com\/ VULNERABLE VERSIONS: 0.6.7 and prior [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"http:\/\/gaisan.com\/blogs\/index.php?rest_route=\/wp\/v2\/posts\/12805"}],"collection":[{"href":"http:\/\/gaisan.com\/blogs\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/gaisan.com\/blogs\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/gaisan.com\/blogs\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/gaisan.com\/blogs\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12805"}],"version-history":[{"count":0,"href":"http:\/\/gaisan.com\/blogs\/index.php?rest_route=\/wp\/v2\/posts\/12805\/revisions"}],"wp:attachment":[{"href":"http:\/\/gaisan.com\/blogs\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/gaisan.com\/blogs\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12805"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/gaisan.com\/blogs\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}