Advertisement






Multiple vulnerabilities in phpAdsNew

CVE Category Price Severity
CVE-2020-24714 CWE-264 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2005-11-18
CPE
cpe:cpe:/a:phpadsnew:phpadsnew
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2005110032

Below is a copy:

Title: Multiple vulnerabilities in phpAdsNew
Date: 10.11.2005
ID: FS-05-01
Author: Toni Koivunen (toni.koivunen (at) fitsec.com)


Synopsis:

phpAdsNew has a path disclosure vulnerability which allows a potential
attacker to learn the path where phpAdsNew is installed

Background:

phpAdsNew is a banner management and tracking system written in PHP.

Affected versions:

Atleast 2.0.6, most likely others versions also.

Description:

Vuln 1:
Full Path Disclosure in create.php

If user can access the misc/revisions/create.php, the script will
echo the whole installation path to the user:
"Starting scan at /var/www/mysite/html/ads"
If the revision script completes successfully, the user can then
try to access libraries/defaults/revisions.txt, which will then
reveal all files and their revisions and hashes, thus furthermore
revealing all files that have been manually modified by the site admin.

The revisions.txt will also reveal any file that has been added under
the installation tree, unless it's hidden (starts with '.')

Vuln 2:
Full Path Disclosures in the following files (Just by accessing with browser)

admin/lib-updates.inc.php
admin/lib-targetstats.inc.php
admin/lib-size.inc.php
admin/lib-misc-stats.inc.php
admin/lib-hourly-hosts.inc.php
admin/lib-hourly.inc.php
admin/lib-history.inc.php
admin/graph-daily.php

Vuln 3:
SQL-injection in logout.php / lib-sessions.inc.php

phpAdsNew doesn't properly validate the sessionID it receives from
cookie when it tries to log out the user. And it doesn't even check
if the user if really logged in in the first place, thus allowing
unauthorized users to feed data into the SQL-query that's supposed to
clean the phpads_session -table.
Take into note though that this requires magic_quotes_gpc to be off.


Impact:

A remote attacker could exploit this to learn installation paths on
server, as well as to locate new files and possible manually modified
files.

If magic_quotes_gpc is off, a remote attacker can also compromise the
integrity of the database.

Solution:

Update to the newest version


Acknowledgements:
To the community at dievo.org, keep it up :)

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum