Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title SiteBar: Multiple issues
Informations
Name GLSA-200711-05 First vendor Publication 2007-11-06
Vendor Gentoo Last vendor Modification 2007-11-06
Severity (Vendor) High Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:C/I:C/A:C)
Cvss Base Score 9 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Synopsis

Multiple issues have been identified in SiteBar that might allow execution of arbitrary code and arbitrary file disclosure.

Background

SiteBar is a PHP application that allows users to store their bookmarks on a web server.

Description

Tim Brown discovered these multiple issues: the translation module does not properly sanitize the value to the "dir" parameter (CVE-2007-5491, CVE-2007-5694); the translation module also does not sanitize the values of the "edit" and "value" parameters which it passes to eval()
and include() (CVE-2007-5492, CVE-2007-5693); the log-in command does not validate the URL to redirect users to after logging in
(CVE-2007-5695); SiteBar also contains several cross-site scripting vulnerabilities (CVE-2007-5692).

Impact

An authenticated attacker in the "Translators" or "Admins" group could execute arbitrary code, read arbitrary files and possibly change their permissions with the privileges of the user running the web server by passing a specially crafted parameter string to the "translator.php"
file. An unauthenticated attacker could entice a user to browse a specially crafted URL, allowing for the execution of script code in the context of the user's browser, for the theft of browser credentials or for a redirection to an arbitrary web site after login.

Workaround

There is no known workaround at this time.

Resolution

All SiteBar users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/sitebar-3.3.9"

References

[ 1 ] CVE-2007-5491 : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5491
[ 2 ] CVE-2007-5492 : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5492
[ 3 ] CVE-2007-5692 : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5692
[ 4 ] CVE-2007-5693 : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5693
[ 5 ] CVE-2007-5694 : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5694
[ 6 ] CVE-2007-5695 : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5695

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200711-05.xml

Original Source

Url : http://security.gentoo.org/glsa/glsa-200711-05.xml

CWE : Common Weakness Enumeration

% Id Name
33 % CWE-94 Failure to Control Generation of Code ('Code Injection')
33 % CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25)
17 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)
17 % CWE-59 Improper Link Resolution Before File Access ('Link Following')

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:18769
 
Oval ID: oval:org.mitre.oval:def:18769
Title: DSA-1423-1 sitebar - several vulnerabilities
Description: Several remote vulnerabilities have been discovered in sitebar, a web based bookmark manager written in PHP.
Family: unix Class: patch
Reference(s): DSA-1423-1
CVE-2007-5491
CVE-2007-5492
CVE-2007-5693
CVE-2007-5694
CVE-2007-5695
CVE-2007-5692
Version: 7
Platform(s): Debian GNU/Linux 4.0
Product(s): sitebar
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

OpenVAS Exploits

Date Description
2008-09-24 Name : Gentoo Security Advisory GLSA 200711-05 (sitebar)
File : nvt/glsa_200711_05.nasl
2008-01-17 Name : Debian Security Advisory DSA 1423-1 (sitebar)
File : nvt/deb_1423_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
45516 Translation Module for SiteBar (translator.php) lang Variable Traversal Arbit...

43760 Translation Module for SiteBar (translator.php) value Variable Arbitrary PHP ...

SiteBar contains a flaw that may allow a remote attacker to execute arbitrary commands or code. The issue is due to the translator.php script not properly sanitizing user-supplied input to the value parameter. This may allow an attacker to include arbitrary PHP commands that will be executed.
43604 Translation Module for SiteBar (translator.php) upd cmd Action edit Variable ...

SiteBar contains a flaw that may allow a remote attacker to execute arbitrary commands or code. The issue is due to the translator.php script not properly sanitizing user-supplied input to the edit parameter. This may allow an attacker to include arbitrary PHP commands that will be executed.
41581 SiteBar command.php forward Variable Arbitrary Site Redirect

SiteBar contains a flaw that allows a remote cross site redirection attack. This flaw exists because the application does not validate the forward parameter upon submission to the command.php script. This could allow a user to create a specially crafted URL, that if clicked, would redirect a victim from the intended legitimate web site to an arbitrary web site of the attacker's choosing. This could be leveraged to direct a user to a web page containing attacks that target client side software such as a web browser or document rendering programs.
41359 SiteBar index.php target Parameter XSS

SiteBar contains a flaw that allows a remote cross site scripting (XSS) attack. This flaw exists because the application does not validate the target parameter upon submission to the index.php script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.
41358 SiteBar command.php Modify User Action uid Parameter XSS

SiteBar contains a flaw that allows a remote cross site scripting (XSS) attack. This flaw exists because the application does not validate the uid parameter upon submission to the command.php script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.
41357 SiteBar Folder Properties Action nid_acl Parameter XSS

SiteBar contains a flaw that allows a remote cross site scripting (XSS) attack. This flaw exists because the application does not validate the nid_acl parameter upon submission to the command.php script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.
41356 SiteBar New Password Action token Parameter XSS

SiteBar contains a flaw that allows a remote cross site scripting (XSS) attack. This flaw exists because the application does not validate the token parameter upon submission to the command.php script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.
41355 SiteBar integrator.php lang Parameter XSS

SiteBar contains a flaw that allows a remote cross site scripting (XSS) attack. This flaw exists because the application does not validate the lang parameter upon submission to the integrator.php script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.
41110 SiteBar translator.php dir Parameter Traversal Arbitrary File Access

SiteBar contains a flaw that allows a REMOTE attacker to traverse outside of a restricted path. The issue is due to the SCRIPT not properly sanitizing user input, specifically directory traversal style attacks (e.g., ../../) supplied via the dir parameter. This directory traversal attack would allow the attacker to retrieve arbitrary files.

Nessus® Vulnerability Scanner

Date Description
2007-12-11 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1423.nasl - Type : ACT_GATHER_INFO
2007-11-07 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200711-05.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:35:16
  • Multiple Updates