mailing list archives
Advisory 21/2005: Multiple vulnerabilities in PHPKIT
From: Christopher Kunz <christopher.kunz () hardened-php net>
Date: Tue, 08 Nov 2005 09:23:57 +0100
-----BEGIN PGP SIGNED MESSAGE-----
Hardened PHP Project
-= Security Advisory =-
Advisory: Multiple vulnerabilities in PHPKIT
Release Date: 2005/11/07
Last Modified: 2005/11/04
Author: Christopher Kunz <christopher.kunz () hardened-php net>
Application: PHPKIT 1.6.1 R2 and prior
Severity: Cross-Site Scripting, SQL injection and information
disclosure, password hash disclosure, local file
disclosure, arbitrary code execution
Risk: High / Critical (depending on server configuration)
Vendor Status: No fix available
PHPKIT  is a combined content management, homepage building and community
software written in PHP. Although it is available as open source, it has
to be licensed for any other than private use. PHPKIT has the usual feat-
ures for that kind of product (content editing, forums, user management,
etc.). Typically for content management and portal systems, there are
multiple vulnerabilities in several places in the front- and backend.
The install base for PHPKIT can only be estimated - Google shows about
25,000 results for the query "powered by phpkit" .
Since we did not perform a full audit, there is no guarantee that the de-
scribed vulnerabilities are the only ones in the product.
Although the PHPKIT team seems to have made an effort to mitigate attacks
with cross-site scripting, this was only partially successful. We found
a number of critical XSS holes that can be exploited by any third party
to steal admin cookies, change HTML code, launch CSRF attacks and so on.
1.1) login/profile.php and login/userinfo.php
Two fields in the profile settings - those for AIM and Yahoo! screen
names - are inserted into the database without any input validation.
Thus, an XSS attack can be performed that is launched on any user who
looks at the offending profile.
The same attack can be launched on an administrator viewing a profile
via the administrator back-end.
1.2) admin/admin.php (with register_globals On)
Since the variable $site_body is not properly initialized, an attacker
can launch an XSS attack against the administrator login screen. This
attack can utilize DOM to steal the administrator's credentials in
cleartext as long as they have some kind of "password safe" function
in their browser. Since script code can be executed on load, all that
an attacker has to do is get the administrator to click on a manipula-
1.3) Referrer statistics
By launching a HTTP request with the Referer set to some script code,
e.g. <script>alert('foo')</script>, an attacker prompts this code to
be included in the administrative backend, and executed as soon as
an administrator views the referrer statistics. This comes in handy
since it is a quasi-anonymous way of obtaining the administrator's
Although input filtering takes place in the subject and content of
a forum postings, no such filtering is performed when constructing
the HTML <title> tag and the logo's <img alt> attribute - both con-
tain the thread subject in unfiltered HTML, and script code is execu-
ted twice per page.
PHPKIT's own instant messaging system does not perform input validation
on the subject line, so any user can IM the admin and contain script
code in the subject.
The "Homepage" input field in the guest book is not properly sanitized
and any guest (no logged-in users, because their home page is not dis-
played by default) can enter script code. As usual, this is displayed
as soon as the guestbook is viewed.
2) SQL Injection
Same as above: Although many places inside the PHPKIT software are not
prone to SQL injection, some are. This leads to information disclosure
and possibly deletion of arbitrary data in the database.
2.1) SQL injection in profile pages (with magic_quotes_gpc Off)
Using a simple injection, any user of the PHPKIT-powered web site can
disclose the administrator's password hash. This is done via the $id
parameter in login/userinfo.php which is not properly sanitized. With
a crafted UNION statement, the attacker can obtain arbitrary data, in-
cluding but not limited to any user's password hash. A simple cast into
an int would have prevented this problem.
Since sessions are contained within the database, an attacker can craft
a session ID to contain SQL commands (which have to be exactly 32 Bytes
in length, though. The vulnerable code is directly in include.php:
session_userid FROM ".$db_tab['session']." WHERE
session_id='".$_REQUEST['PHPKITSID']."' LIMIT 1"));
This SELECT yields one result which is then fed to another SQL query:
$DB->query("DELETE FROM ".$db_tab['session']." WHERE session_id='"
.$session['session_id']."' LIMIT 1");
Using a carefully-crafted SQL statement, arbitrary data rows can be
deleted from the database.
3) Arbitrary local file inclusion and local code execution
Using the vulnerable path parameter that is used in nearly every subsys-
tem of PHPKIT, an attacker can include arbitrary files on the local file
system. This includes uploaded avatars (preferrably in PNG format) that
can also include PHP code. Uploading avatars is not enabled in the
default configuration, so this attack vector is unlikely to be open in
every PHPKIT installation in the wild.
Example: echo "<?php phpinfo() ?>" >> avatar.png
4) Remote code execution (with register_globals On)
Yeah, we saved the best for last. Since PHPKIT relies heavily on eval()
for its homegrown template engine, an attacker only needs a way to inject
a variable in curly braces including PHP code. With register_globals set
to On (which is still the case in a lot of installations, for compati-
bility purposes), this can be accomplished via the help function that
makes use of not properly initialized variables. Thus, any PHP code can
There is a number of other places, including the admin backend, that are
vulnerable to this kind of code injection. These vulnerabilities are
either exploitable via complex syntax (a.k.a. curly braces) or, if magic_
quotes_gpc is turned Off, with any code that includes "".
The whole template system urgently needs to be rewritten from scratch,
without relying on unsafe variables and with careful consideration for
Proof of Concept:
Apart from the examples mentioned above, the Hardened PHP Project is not
going to release any PoC for these vulnerabilities to the public.
30. September 2005 - Vendor informed.
05. October 2005 - Vendor contacted via phone. Advisory re-sent (allegedly
lost in transit).
16. October 2005 - Vendor informed of intended disclosure timeline.
07. November 2005 - public disclosure at the 2005 International PHP Confer-
Credit for the vulnerabilities listed in 4) goes to Stefan Esser of the
Credit for the vulnerability described in 2.2) goes to Stefan Walk.
Credit for the vulnerability named 1.2) goes to Johann-Peter Hartmann.
All other vulnerabilities were investigated by the author.
With the aforementioned lack in vendor reaction, we currently recommend
avoiding usage of PHPKIT altogether.
If you already use the product, we recommend installing the Hardening-Patch
for PHP which can be obtained on our website, and deactivating the
"register_globals" setting in php.ini, virtual host configuration or
You can discuss this and other vulnerabilities in our forum at
http://forum.hardened-php.net/ - an up-to-date list of advisories can be
found at http://www.hardened-php.net/.
pub 1024D/0A864AA1 2004-04-17 Hardened-PHP Signature Key
Key fingerprint = 066F A6D0 E57E 9936 9082 7E52 4439 14CC 0A86 4AA1
Copyright 2005 Christopher Kunz / Hardened PHP Project. All rights reserved.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)
-----END PGP SIGNATURE-----
- Advisory 21/2005: Multiple vulnerabilities in PHPKIT Christopher Kunz (Nov 08)