Home page logo

bugtraq logo Bugtraq mailing list archives

[ARL02-A11] Big Sam (Built-In Guestbook Stand-Alone Module) Multiple Vulnerabilities
From: Ahmet Sabri ALPER <s_alper () hotmail com>
Date: 18 Mar 2002 23:31:23 -0000

+/--------\-------- ALPER Research Labs ------/--------/+
+/---------\-------  Security Advisory  -----/---------/+
+/----------\------    ID: ARL02-A11    ----/----------/+
+/-----------\----- salper () olympos org  ---/-----------/+

Advisory Information
Name               : Big Sam (Built-In Guestbook Stand-
Alone Module) Multiple Vulnerabilities
Software Package   : Big Sam (Built-In Guestbook 
Stand-Alone Module) 
Vendor Homepage    : http://bigsam.gezzed.net/
Vulnerable Versions: v1.1.08 and previous versions
Platforms          : PHP Dependent
Vulnerability Type : Input Validation Error
Vendor Contacted   : 15/03/2002
Vendor Replied     : 17/03/2002
Prior Problems     : N/A
Current Version    : v1.1.09 (immune)

Big Sam (Built-In Guestbook Stand-Alone Module) is 
a PHP3/4 script guestbook which does not use 
It is very simple to set up, very simple to administer, 
and very accurate.

A vulnerability exists in Big Sam, which may cause 
extreme usage of system resources and may cause 
web root path disclosure.

The "bigsam_guestbook.php" where all the 
guestbook viewing operations take place, there's an 
option to view entries according to their number in 
different pages.
This is accomplished by using "$displayBegin" 
supplied with integers.

When a user requests a maliciously crafted URL, the 
script will run as usual but if the given number is a 
really huge one, the system may run out of resources 
in time, or if the "safe_mode" option is "ON" in PHP 
config of server, the script might prematurely end 
giving an error message, including the web root path.

Put many numbers instead of dots in the example 

If the "safe_mode" option is "ON", a possible error 
message like the one below may appear 
approximately in 30 seconds depending on server 

"Fatal error: Maximum execution time of 30 seconds 
exceeded in 
on line 16"

This information may be used to aid in 
further "intelligent" attacks against the host running 
the vulnerable Big Sam guestbook.

The vendor has verified the existence of the 
vulnerebility and fixed this issue in version 1.1.09 

I suggested following as a workaround:
Limit the "$displayBegin" variable, or check if the 
given post number exists.

Discovered on 15, March, 2002 by 
Ahmet Sabri ALPER 
salper () olympos org

Product Web Page: http://bigsam.gezzed.net/

  By Date           By Thread  

Current thread:
  • [ARL02-A11] Big Sam (Built-In Guestbook Stand-Alone Module) Multiple Vulnerabilities Ahmet Sabri ALPER (Mar 19)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]