Welcome to Geeklog, Anonymous Sunday, December 22 2024 @ 12:01 am EST

Geeklog Forums

GL exploit


alk

Anonymous
hey,
a few minutes ago milworm posted this exploit code for geeklog 1.4.
http://www.milw0rm.com/exploits/1963

i would like to know if the current stable GL version 1.4.0sr3 is also affected.

txh in advance!
 Quote

Status: offline

Dirk

Site Admin
Admin
Registered: 01/12/02
Posts: 13073
Location:Stuttgart, Germany
The "plugins" directory should always be located outside of the webroot so that it is not accessible via a URL - and then all those "exploits" wouldn't work.

For the sake of people not following the installation instructions, we have already been fixing these things in CVS but they are still present in 1.4.0sr3, i.e. the current version.

Related information: Installing Geeklog entirely within the web root

bye, Dirk
 Quote

Status: offline

mevans

Forum User
Full Member
Registered: 02/08/04
Posts: 393
Location:Texas
Just an FYI, but I'm already seeing the script kiddies hitting my sites with these attempts. They are not having any success, but it doesn't take long for them to start trying!

Thanks!
Mark
 Quote

Status: offline

Dirk

Site Admin
Admin
Registered: 01/12/02
Posts: 13073
Location:Stuttgart, Germany
Quote by mevans: Just an FYI, but I'm already seeing the script kiddies hitting my sites with these attempts.

Same here, including silly things like /index.php/plugins/... which just confirms that they are entirely clueless.

Btw, forgot to mention: The above "exploit" also lists all the plugin's functions.inc files as vulnerable. But .inc files aren't normally executed.

bye, Dirk
 Quote

Status: offline

andyofne

Forum User
Chatty
Registered: 08/31/02
Posts: 69
"They" uploaded a file into my geeklog system directory, for what it's worth. It *WAS* accessible through a URL. I've fixed it on ONE of many of my sites.

 Quote

alk

Anonymous
http://www.milw0rm.com/exploits/1964

now i am scared ...
 Quote

alk

Anonymous
i have deactivated the advanced editor.
 Quote

ironmax

Anonymous
After careful considerations, I have decided not to run the fckeditor on my site. Our users will just have to make due with what is provided until this glitch is finally resolved.
 Quote

Status: offline

Dirk

Site Admin
Admin
Registered: 01/12/02
Posts: 13073
Location:Stuttgart, Germany
Okay, that looks like a real problem. And it's not enough to disable FCKeditor (which isn't enabled by default, as the exploit claims), as this goes directly to the files.

I'd suggest you remove the entire 'filemanager' subdirectory, i.e. /path/to/geeklog/public_html/fckeditor/editor/filemanager and disable 'mcpuk' in the FCKeditor config file (fckconfig.js): Set FCKConfig.LinkBrowser, FCKConfig.ImageBrowser, and FCKConfig.FlashBrowser = false (each of them).

Afterwards, check the /images/library subdirectories for suspicious files, especially ones containing "suntzu" in their name.

If you still want to use FCKeditor, you will have to live without its upload capabilities for now (or upgrade to FCKeditor 2.3 - instructions can be found elsewhere in the forum).

bye, Dirk

(edit: the directory name is 'filemanager', not 'filebrowser')
 Quote

alk

Anonymous
i had the "suntzu" files in my images/File dir but the exploit itself didn`t work (tested) Cool

shell_execution is disallowed on my server.

i have chmod 000 the fckeditor dir now an i am going to update it when i have a little piece of time.

thank you for this great software and let us hope that there are no more lacks of security in the code.
 Quote

All times are EST. The time is now 12:01 am.

  • Normal Topic
  • Sticky Topic
  • Locked Topic
  • New Post
  • Sticky Topic W/ New Post
  • Locked Topic W/ New Post
  •  View Anonymous Posts
  •  Able to post
  •  Filtered HTML Allowed
  •  Censored Content