AOH :: HP Unsorted O :: VA3041.HTM

OpenX 2.6.4 multiple vulnerabilities



OpenX 2.6.4 multiple vulnerabilities
OpenX 2.6.4 multiple vulnerabilities



__________________________________________________________________=0D
=0D
   OpenX multiple vulnerabilities=0D
__________________________________________________________________=0D
=0D
=0D
An advisory by EnableSecurity in collaboration with Acunetix. =0D
=0D
Advisory URL: =0D
http://resources.enablesecurity.com/advisories/openx-2.6.4-multiple.txt=0D 
=0D
Version: OpenX 2.6.4 and older versions=0D
=0D
Description:=0D
=0D
OpenX is an online advertising web application written in PHP that supports popular sites such as TechCrunch, SUN Microsystems and Metacafe. =0D
=0D
>From their website (openx.org):=0D
"OpenX is a free, open source ad server that manages the selling and delivery of your online advertising inventory. You can get OpenX as a hosted service or as downloaded software."=0D
=0D
Credits:=0D
=0D
These vulnerabilities were discovered during testing of AcuSensor Technology feature in Acunetix WVS.=0D
We worked with the OpenX security team to have these security flaws reported and fixed. =0D
We would like to publicly thank the OpenX team for their prompt response!=0D
=0D
__________________________________________________________________=0D
=0D
Technical details:=0D
=0D
The following vulnerabilities were identified:=0D
=0D
Major issues:=0D
  - SQL injection=0D
  - Cross Site Scripting=0D
=0D
Other issues:=0D
  - Arbitrary File Deletion=0D
  - CRLF injection=0D
=0D
=0D
=0D
----------- Major issues -----------=0D
=0D
::::: SQL vulnerabilities :::::=0D
=0D
[[ Trigger: /adview.php ]] =0D
=0D
Description: =0D
The cookie "OAID" is not filtered when adview.php is accessed and used directly to construct the SQL INSERT statement. =0D
=0D
[[ Trigger: /www/delivery/tjs.php ]]=0D
=0D
Description: =0D
1. The cookie "OAID" is not filtered when adview.php is accessed and used directly to construct the SQL INSERT statement. =0D
2. The "referer" parameter in the GET request is also used in the SQL statement and is another vector.=0D
=0D
=0D
=0D
::::: XSS Vulnerabilities :::::=0D
=0D
[[ Trigger: /www/admin/sso-accounts.php ]] =0D
=0D
Description:=0D
The "email" parameter in the POST data is simply printed out in the html page, allowing injection of HTML i.e. XSS attacks. =0D
=0D
----------- Possible issues ----------- =0D
=0D
=0D
::::: Arbitary file deletion :::::=0D
=0D
[[ Trigger: /www/delivery/tjs.php ]]=0D
=0D
Reason:=0D
May not be easily exploitable but it does allow directories to be traversed when deleting cache files. =0D
=0D
Exploitation: =0D
It does not seem to be exploitable on Linux, but might be exploitable on Windows. On Linux the following path would not open: /etc/../asdf/../passwd because "asdf" does not exist. However the following works on Windows: C:\asdf\..\boot.ini, even if "asdf" does not exist.=0D
=0D
=0D
::::: CRLF Injection :::::=0D
=0D
Reason: =0D
It seems that the current version of PHP does not allow headers with multiple lines, i.e ones that contain the carraige and return line feed characters. Therefore OpenX does not appear to be exploitable. However, the code does allow CRLF injection and this may be exposed in some other way *(eg. old versions of PHP ?). =0D
=0D
[[ Trigger: /adframe.php ]]=0D
=0D
[[ Trigger: /adjs.php ]]=0D
=0D
[[ Trigger: /www/delivery/tjs.php ]]=0D
=0D
=0D
__________________________________________________________________=0D
=0D
Demonstration:=0D
http://www.youtube.com/watch?v=kiNeiMS2Iu0=0D 
=0D
Exploit code:=0D
Available to organizations by contacting info@enablesecurity.com=0D 
=0D
Timeline:=0D
=0D
Feb 03, 2009: An email was sent to the security team at OpenX and PGP keys exchanged=0D
Feb 03, 2009: Sent report to OpenX team with full details=0D
Feb 04, 2009: A patch was provided to us and we verified that the patch fixes the reported issues=0D
Apr 01, 2009: Co-ordinated information release=0D
=0D
Solution:=0D
=0D
Upgrade to the latest version of OpenX:=0D
http://www.openx.org/ad-server/download=0D 
=0D
__________________________________________________________________=0D
=0D
About EnableSecurity:=0D
=0D
EnableSecurity is dedicated to providing high quality Information Security Consultancy, Research and Development. EnableSecurity develops security tools such as VOIPPACK (for Immunity CANVAS) and SIPVicious. EnableSecurity is focused on analysis of security challenges and providing solutions to such threats. EnableSecurity works on developing custom targeted security solutions, as well as working with existing off the shelf security tools to provide the best results for their customers. More info at enablesecurity.com=0D
=0D
About Acunetix:=0D
Acunetix Web Vulnerability Scanner is a tool designed to discover security holes in web applications that attackers could abuse to gain access to a business' systems and data. With Acunetix WVS websites can be regularly checked for vulnerabilities such as SQL injection and Cross Site Scripting. The scanner ships with many innovative features such as: AcuSensor Technology, automatic JavaScript analyzer, Visual macro recorders and extensive reporting facilities, which include various compliance reports.=0D
=0D
Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. =0D

The entire AOH site is optimized to look best in Firefox® 3 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH
We do not send spam. If you have received spam bearing an artofhacking.com email address, please forward it with full headers to abuse@artofhacking.com.