1
Tobias
[solved] Wiwimod and spaw vulnerability?
  • 2007/6/22 17:24

  • Tobias

  • Not too shy to talk

  • Posts: 172

  • Since: 2005/9/13


I've got a few suspicious referers lately, so I've googled back and found this here:http://www.milw0rm.com/exploits/4084

Now, that seems to be about a fairly old version, and I don't use Spaw and don't seem to have any residual files for it. But since I honestly don't understand what's going on there, I just thought I put it out here and wait for someone to look into it and enlighten me before I bring my wiki up again. Thanks!

Also here:http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3289. Might be a duplicate of an old one.

*edit* I definitely got tons of hits on the file in question over the last days. This might be a serious issue for people who have Wiwimod 0.4 and perhaps some other vulnerable versions installed.

*edit again* I even got a sample of the script they wanted to execute. I'm almost tempted to try to exploit myself, to see where that leads to. :S
www.affvu.org

2
Anonymous
Re: Wiwimod vulnerability?
  • 2007/6/22 17:58

  • Anonymous

  • Posts: 0

  • Since:


As you say, a very old version of wiwimod.

Latest version is 0.8.3 and the obvious advice is "keep your modules up to date"

Interesting to know what happens with that script )hope you have a backup of your site

3
Tobias
Re: Wiwimod vulnerability?
  • 2007/6/22 18:18

  • Tobias

  • Not too shy to talk

  • Posts: 172

  • Since: 2005/9/13


Ok, thanks. That's what I figured. The script they want to run is quite obviously about getting a shell from the server. So I think I better don't try it. Might get me in deep #OOPS# with my webhost, hehehe.

In any case: Watch out everyone with Wiwimod and a directory called "spaw" inside the wiwimod directory. Even if it's an old exploit, it looks like it's been revived by someone. So there's some activity on that count.
www.affvu.org

4
Anonymous
Re: Wiwimod vulnerability?
  • 2007/6/22 20:46

  • Anonymous

  • Posts: 0

  • Since:


Could "Spaw" be related to the wysiwyg editor of the same name?

5
Tobias
Re: Wiwimod vulnerability?
  • 2007/6/22 22:34

  • Tobias

  • Not too shy to talk

  • Posts: 172

  • Since: 2005/9/13


Quote:
Could "Spaw" be related to the wysiwyg editor of the same name?

That's my understanding. I believe it is a vulnerability in an old version of the Spaw editor which exists with those modules/scripts that make use of its class. My wiwimod doesn't, probably because it never did. But perhaps, I've also kicked out Spaw, because I had other wysiwyg editors.

In any case, I don't know what happens at those sites where the wiwimod version with the spaw editor has been simply upgraded, without removing the spaw files, so that, even though the spaw stuff isn't used by wiwimod anymore, it's still there and waiting to be attacked. One would hope it aborts, because of errors and root path and stuff, but who knows?

Which is why I would recommend everyone has a look into their installation and see whether they have the spaw stuff in there. In case they do, it might be wise to take precautions. I think that just deleting the directory root/modules/wiwimod/spaw should do here.

That's a remote file inclusion vulnerability, and it seems to be really ridiculously easy to exploit. You just pass a path to your own script in the url query string, and that stupid spaw script parses your own malicious script and includes it in its own flow. Something like that. It does you the favor to parse your own script, figure that!

Apparently, the vulnerable spaw has also been used in XT Conteudo (see last comment), and who knows where else. I, in any case, have grep'd all my installation for all vestiges of spaw.
www.affvu.org

6
BlueStocking
Re: Wiwimod vulnerability?

I have winmod installed on my site. Winmod was one of the modules that was listed with the spaw related (milw0rm.com [2007-06-20]) I discovered this from following the security links and seeing where this one was involved. I was/am not using the spaw editor so it did not affect me.

http://www.xoops.net.br/modules/wiwimod/index.php?page=Security+Alerts&back=WiwiHome
https://xoops.org/modules/repository .. It is time to get involved - XOOPS.ORG

7
Tobias
Re: Wiwimod vulnerability?
  • 2007/6/22 23:04

  • Tobias

  • Not too shy to talk

  • Posts: 172

  • Since: 2005/9/13


Thanks for the hint. Phppp has also published a security alert some days back. It's athttps://xoops.org/modules/news/article.php?storyid=3799
www.affvu.org

8
giba
Re: Wiwimod vulnerability?
  • 2007/6/22 23:56

  • giba

  • Just can't stay away

  • Posts: 638

  • Since: 2003/4/26


Hi Xoopers, Tobias is correct. Delete spaw directory urgent.

9
Peekay
Re: Wiwimod vulnerability?
  • 2007/6/23 0:02

  • Peekay

  • XOOPS is my life!

  • Posts: 2335

  • Since: 2004/11/20


@moderator
This thread should be renamed [Resolved]
A thread is for life. Not just for Christmas.

Login

Who's Online

151 user(s) are online (107 user(s) are browsing Support Forums)


Members: 0


Guests: 151


more...

Donat-O-Meter

Stats
Goal: $100.00
Due Date: Mar 31
Gross Amount: $0.00
Net Balance: $0.00
Left to go: $100.00
Make donations with PayPal!

Latest GitHub Commits