phpMoneyBooks Local File Inclusion and Script Insertion Vulnerabilities


Description   Multiple vulnerabilities have been discovered in phpMoneyBooks, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to disclose potentially sensitive information.
1) Input passed via the "module" and "file" parameters to index.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local resources via directory traversal attacks.
2) Input passed via the "AcctName", "AcctType", "AcctAddress", "AcctPhone", and "AcctNotes" parameters to index.php (when "module" is set to "banks" and "action" is set to "AddAcct") is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious data is being viewed.
3) Input passed via the "DisplayName", "AcctNo", "CompanyName", "Contact", "MrMs", "Phone", "FirstName", "FAX", "MiddleIn", "Phone2", "LastName", "BillingAddress", and "ShippingAddress" parameters to index.php (when "module" is set to "customers" and "action" is set to "AddUser") is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious data is being viewed.
Successful exploitation of vulnerabilities #2 and #3 requires an access permission of 30 or less.
The vulnerabilities are confirmed in version 1.0.4. Other versions may also be affected.
     
Vulnerable Products   Vulnerable Software:
phpMoneyBooks 1.x
     
Solution   No official solution is currently available.
     
CVE   CVE-2012-6665
CVE-2012-1669
     
References   http://seclists.org/oss-sec/2012/q1/650
http://packetstormsecurity.org/files/114331/PHP-Money-Books-1.03-Stored-Cross-Site-Scripting.html
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
Misc : Directory traversal - parameter starting with ../
3.2.0
Directory traversal using ..\..
3.2.0
Directory traversal
3.2.0
Directory traversal backward root folder
3.2.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2012-03-16 

 Target Type 
Server 

 Possible exploit 
Remote