Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:11794
HistoryMar 13, 2006 - 12:00 a.m.

[UNIX] Zeroboard IP Session Bypass XSS

2006-03-1300:00:00
vulners.com
15

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web
site: http://www.securiteam.com

    • promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html


Zeroboard IP Session Bypass XSS

SUMMARY

Zeroboard is "a popular web notice board used in Korea". INetCop Security
found XSS vulnerability in the latest zeroboard version 4.1 pl 7 (2005. 4.
4). Basically, zeroboard uses the following algorithm so that session may
not be abused by the attack related with cookie. (e.g: cookie spoofing,
sniffing).

DETAILS

Vulnerable Systems:

  • Zeroboard version 4.1 pl 7 (2005. 4. 4)

After login, is part that handle session, bbs/login_check.php:

24 //
25 if($member_data[no]) {
26
27 if($auto_login) {
28 makeZBSessionID($member_data[no]);
29 }
30
31 // 4.0x
32 $zb_logged_no = $member_data[no];
33 $zb_logged_time = time();
34 $zb_logged_ip = $REMOTE_ADDR; <— Recording IP address
35 $zb_last_connect_check = '0';
36
37 session_register("zb_logged_no");
38 session_register("zb_logged_time");
39 session_register("zb_logged_ip");
40 session_register("zb_last_connect_check");
41

If IP address is different from present session user's, connection
terminates, bbs/lib.php:
94 //
95 } elseif($HTTP_SESSION_VARS["zb_logged_no"]) {
96
97 //

98 if&#40;time&#40;&#41;-$HTTP_SESSION_VARS[&quot;zb_logged_time&quot;]&gt;

$_zbDefaultSetup["login_time"]||$HTTP_SESSION_VARS["zb_logged_ip"]!=$REMOTE_ADDR)
{
99
100 $zb_logged_no=""; // session initialization
101 $zb_logged_time="";
102 $zb_logged_ip="";
103 session_register("zb_logged_no");
104 session_register("zb_logged_ip");
105 session_register("zb_logged_time");
106 session_destroy();
107
108 //
109 } else {

This seems to be intercepting cookie hacking. But, if we take advantage of
IP session disablement technique, session bypassing may be possible.
Detailed explanation about the way to exploit this vulnerability is found
at the following reference URL:
<http://x82.inetcop.org/h0me/papers/iframe_tag_exploit.txt&gt;
http://x82.inetcop.org/h0me/papers/iframe_tag_exploit.txt (Korean)

As a result, hacker through administrator's web browser exploit code
workably become.

Disclosure Timeline:
2003-04.??: Vulnerabilities found.
2006-02.17: 1st vendor contact. (didn't respond)
2006-02.22: 2nd vendor contact. (didn't respond)
2006-02.25: Vendor responded, patch released.
2006-03.12: Public disclosure.

Patch:
INetCop Security released temporary patch:
<http://inetcop.net/upfiles/Zeroboard-4.1_pl7_patch.tgz&gt;
http://inetcop.net/upfiles/Zeroboard-4.1_pl7_patch.tgz

Vendor Patch URL:
<http://www.nzeo.com/bbs/zboard.php?id=cgi_bugreport2&amp;no=5406&gt;
http://www.nzeo.com/bbs/zboard.php?id=cgi_bugreport2&amp;no=5406

ADDITIONAL INFORMATION

The information has been provided by <mailto:[email protected]>
dong-houn yoU.
The original article can be found at:
<http://www.inetcop.org/net_bug/view.php?number=42&amp;first=0&amp;keyfield=&amp;key=&gt;
http://www.inetcop.org/net_bug/view.php?number=42&amp;first=0&amp;keyfield=&amp;key=

========================================

This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to:
[email protected]
In order to subscribe to the mailing list, simply forward this email to: [email protected]

====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental,
consequential, loss of business profits or special damages.