As a result of a short security audit of JFFNMS, a number of security holes were found, even from the perspective of a non authenticated user. The holes included authentication bypass via SQL injection. Javascript injection and a serious case of information disclosure. After liasing with the developers, the holes have been resolved. Attached are the advisory and patch relating to these flaws. Tim -- Tim Brown <mailto:timb@xxxxxxxxxxxxxxxxxxxx> <http://www.nth-dimension.org.uk/>
diff -Nru -x'*.png' -x'*.ini' -x'*.*sql' -x'*.patch'
jffnms-0.8.3/htdocs/admin/adm/test.php
jffnms-0.8.4-pre2/htdocs/admin/adm/test.php
--- jffnms-0.8.3/htdocs/admin/adm/test.php 2006-09-16 20:31:13.000000000
-0300
+++ jffnms-0.8.4-pre2/htdocs/admin/adm/test.php 1969-12-31 21:00:00.000000000
-0300
@@ -1 +0,0 @@
-<? phpinfo(); ?>
\ No newline at end of file
diff -Nru -x'*.png' -x'*.ini' -x'*.*sql' -x'*.patch'
jffnms-0.8.3/htdocs/auth.php jffnms-0.8.4-pre2/htdocs/auth.php
--- jffnms-0.8.3/htdocs/auth.php 2006-09-16 20:31:13.000000000 -0300
+++ jffnms-0.8.4-pre2/htdocs/auth.php 2002-08-13 23:14:54.228705056 -0300
@@ -46,11 +46,6 @@
session_start();
}
- if (($jffnms_version=="0.0.0") &&
($_SERVER["REMOTE_ADDR"]=="128.30.52.13")) { //W3C Validator
- $_REQUEST["user"]="admin";
- $_REQUEST["pass"]="admin";
- }
-
if (!isset($_SESSION["authentification"]))
$authentification = $jffnms->authenticate
($_REQUEST["user"],$_REQUEST["pass"],true,"from ".$_SERVER["REMOTE_ADDR"]);
diff -Nru -x'*.png' -x'*.ini' -x'*.*sql' -x'*.patch'
jffnms-0.8.3/lib/api.classes.inc.php jffnms-0.8.4-pre2/lib/api.classes.inc.php
--- jffnms-0.8.3/lib/api.classes.inc.php 2006-09-16 20:31:14.000000000
-0300
+++ jffnms-0.8.4-pre2/lib/api.classes.inc.php 2002-08-13 23:14:55.656488000
-0300
@@ -677,7 +677,7 @@
$auth_type = 1;
$cant_auth = 0;
- if (isset($user) && isset($pass)) {
+ if (preg_match("/^[\w\@\.]{0,20}$/", $user) && isset($pass)) {
$query_auth = "select id as auth_user_id, usern as
auth_user_name, passwd, fullname as auth_user_fullname from auth where usern =
'$user'";
$result_auth = db_query ($query_auth);
$cant_auth = db_num_rows($result_auth);
@@ -693,18 +693,20 @@
}
if (($auth==0) && ($cant_auth == 0)){ //not found in DB
- if (isset($user) && isset($pass)) {
+
+ if (preg_match("/^[\w\@\.]{0,20}$/", $user) && isset($pass)) {
$query_auth = "select id as auth_user_id, username as
auth_user_name, name as auth_user_fullname from clients where username= '$user'
and password = '$pass'";
$result_auth = db_query ($query_auth);
$auth = db_num_rows( $result_auth);
}
+
if ($auth==1) {
$reg = db_fetch_array($result_auth);
$auth_type = 2;
}
}
- if (($log_event==true) && (!empty($user)))
+ if (($log_event==true) && preg_match("/^[\w\@\.]{0,20}$/", $user))
insert_event(date("Y-m-d
H:i:s",time()),get_config_option("jffnms_internal_type"),1,"Login",(($auth==1)?"successful":"failed"),$user,$log_event_info,"",0);
unset ($reg["passwd"]);
Attachment:
NDSA20070524.txt.asc
Description: application/pgp-keys
Attachment:
signature.asc
Description: This is a digitally signed message part.