Lucene search

K
myhack58佚名MYHACK58:62200925484
HistoryDec 03, 2009 - 12:00 a.m.

OpenX <= 2.8.1 execute arbitrary PHP code-exploits warning-the black bar safety net

2009-12-0300:00:00
佚名
www.myhack58.com
13

Test method:
OpenX adserver version 2.8.1 and lower is vulnerable to remote code
execution. To be exploited, this vulnerability requires banner / file
upload permissions, such as granted to the ‘advertiser’ and
‘administrator’ roles.

This vulnerability is caused by the (insecure) file upload mechanism of
affected OpenX versions. These would check magic bytes of an uploaded
file to determine its MIME type, and erroneously assume this
the information to be reliable. Additionally, while the file name of
uploaded files is changed, the file extension is not.

As such, it is possible to upload image files with embedded PHP code and
. php file extension. Unless PHP script execution is explicitly prevented
for the file upload location (which has not been documented in the OpenX
manual so far and it is not the result of a default installation), the
The PHP code will execute as soon as the HTTP access to the file location will
cause it to be executed by the web server.

To clarify, an attacker exploiting this security issue does require
prior access to OpenX, i.e. exploitation is only possible after
successful authentication. On the other hand, the advertiser access is a
rather low permission level and should not allow for system access.

If these bugs were not hidden from OpenX’ bug tracker, you could read up
more about issue X-5 7 4 7 here:
<https://developer.openx.org/jira/browse/OX/fixforversion/10910&gt;

OpenX 2.8.2 has already been released in October to fix this issue and
can be downloaded from
<http://www.openx.org/ad-server/download&gt;

Moritz Naumann
Naumann IT Security Consulting
Berlin, Germany

<http://www.moritz-naumann.com/&gt;