-=[ SecurityReason-2005-SRA#04 ]=- -=[ Full path disclosure and XSS in PHPNuke ]=- Author: sp3x Date: 3. April 2005 In Memory of John Poul II : =========================== "Love converts hearts and gives peace," - John Poul II [The Great] "To miłość nawraca serca i daruje pokój ludzkości, która wydaje się czasem zagubiona i zdominowana przez siłę zła, egoizmu i strachu" - Jan Paweł II [WIELKI] Affected software : =================== PHP-Nuke version : 6.x - 7.6 Description : ============= PHP-Nuke is a Web Portal System, storytelling software, News system, online community or whatever you want to call it. The goal of PHP-Nuke is to have an automated web site to distribute news and articles with users system. Each user can submit comments to discuss the articles, just similar to Slashdot and many others. Main features include: web based admin, surveys, top page, access stats page with counter, user customizable box, themes manager for registered users, friendly administration GUI with graphic topic manager, option to edit or delete stories, option to delete comments, moderation system, Referers page to know who link us, sections manager, customizable HTML blocks, user and authors edit, an integrated Banners Ads system, search engine, backend/headlines generation (RSS/RDF format), and many, many more friendly functions. PHP-Nuke is written 100% in PHP and requires Apache Web server, PHP and a SQL (MySQL, mSQL, PostgreSQL, ODBC, ODBC_Adabas, Sybase or Interbase). Support for 25 languages, Yahoo like search engine, Comments option in Polls, lot of themes, Ephemerids manager, File Manager, Headlines, download manager, faq manager, advanced blocks systems, reviews system, newsletter, categorized articles, multilanguage content management, phpBB Forums included and a lot more. Vulnerabilities : ***************** Cross-site scripting - XSS : ============================ In PHPNuke there are XSS that can be used to steal cookies and do other operations, which in normal conditions are not permitted by browser's cross-domain security restrictions. Example : ========= http://[target]/[nuke_dir]/modules.php?name=Search&author=[author]&topic=0&min=999999999[XSS]&q uery=[our query] http://[target]/[nuke_dir]/modules.php?name=Search&author=[author]&topic=0&min=999999999[XSS]&q uery=[our_query]&type=users&category=2 http://[target]/[nuke_dir]/modules.php?name=Search&author=[author]&topic=0&min=999999999[XSS]&q uery=[our_query]&type=comments&category=2 http://[target]/[nuke_dir]/modules.php?name=Search&author=[author]&topic=0&min=999999999[XSS]&q uery=[our_query]&type=stories&category=2 http://[target]/[nuke_dir]/modules.php?name=Search&author=[author]&topic=0&min=999999999[XSS]&q uery=[our_query]&type=reviews&category=2 http://[target]/[nuke_dir]/modules.php?name=FAQ&myfaq=yes&id_cat=1&categories=45435[XSS] http://[target]/[nuke_dir]/banners.php?op=EmailStats&login=[our_login]&cid=1&bid=[XSS] http://[target]/[nuke_dir]/modules.php?name=Encyclopedia&file=index&op=terms&eid=1<r=[XSS] To test XSS for example in http://[target]/[nuke_dir]/modules.php?name=Encyclopedia&file=index&op=terms&eid=1<r=[XSS] we can create a form. test.html : -----------
----------------- And enter to inputfield "XSS" this : and click "Go!" :) Or just replace [XSS] with