Bugtraq mailing list archives

Re: XSS and PHP include bug in W-Agora


From: Marc Druilhe <mdruilhe () w-agora net>
Date: Fri, 20 Dec 2002 17:38:00 +0100

Thanks for pointing out this bug. I will fix it ASAP.
Notice that only users that have "system administrator privilege" are concerned. These users are usually
"trusted" and should have all the accesses to the w-agora installation, so IMHO the security hole is not that
sensible.
Nethertheless, I will make a fix in the next coming days.

Thanks again.
-- 
Marc Druilhe
http://www.w-agora.net/

xatr0z a écrit :

I have found some bugs in W-Agora's forum configuration filesystem. In the
page editform.php, an admin or root user can open any file, with the "PHP
Include bug". A sample of the script:

***editform.php***
<?php
# the script gets the parameter "file", puts ".php" after this, and includes
the file in the directory "forums/agora/"
include ( "forums/agora"  .$_GET [ "file" ] . ".php" );
?>
***editform.php***

With the following link, an "admin" or "root" user could open the file
"conf/agora/site_agora.php":
<URL:/editform.php?site=agora&file=../../conf/site_agora> (put the
directory of your W-Agora forum for this file)

Ofcourse, this also works on other files.

The next bug I found was an XSS bug in the "Administration login" page.
Here, any user could simply insert code. When a user visits the following
URI:
<URL:/editform.php?site=agora&blah=">Bug!>

An HTML <INPUT> tag is created, and it would look like this:
<input type="hidden" NAME="blah" VALUE="\">Bug!" />

These are the bugs I found. Maybe that there are more XSS or include bugs in
W-Agora, but I am tired at the moment, but maybe someone will find more.

--

N: D. Willems "xatr0z"
E: <xatr0z at users dot sourceforge dot net>
W: http://rootshell.be/~xatr0z

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.2.1 (MingW32)
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=cKhr
-----END PGP PUBLIC KEY BLOCK-----


Current thread: