Menu

Search for hundreds of thousands of exploits

"LiveZilla 5.0.1.4 - Remote Code Execution"

Author

Exploit author

"Curesec Research Team"

Platform

Exploit platform

php

Release date

Exploit published date

2013-11-18

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
CVE-2013-6225: Security Advisory  Curesec Research Team

1. Introduction

Advisory ID:     Cure-2013-1007
Advisory URL:     https://www.curesec.com/de/veroeffentlichungen
/advisories.html
Blog URL:    https://cureblog.de/2013/11/remote-code-execution-in-livezilla/
Affected Product:   LiveZilla version 5.0.1.4
Affected Systems   Linux/Windows
Fixed in:     5.1.0.0
Fixed Version Link:
https://www.livezilla.net/downloads/pubfiles/LiveZilla_5.1.0.0_Full.exe
Vendor Contact:   support@livezilla.net
Vulnerability Type:   Remote Code Execution / Local File Inclusion
Remote Exploitable:   Yes
Reported to vendor   18.10.2013
Disclosed to public   15.11.2013
Release mode:     Coordinated release
CVE:       CVE-2013-6225
Credentials:     crt@curesec.com

2. Vulnerability Description

Livezilla is a online chat system used on websites so customers can be
contacted by an employee ask their questions and get delivered what they
are looking for. The software itself is used basically in every industry.

Looking for possible affected systems google reveals: 1.500.000 results.

Inside the file mobile/php/translation/index.php the following code
can be found:

$langFileLocation = .;
$LZLANG = Array();if (isset($_GET['g_language'])) {
$language = ($_GET['g_language'] != ) ? $_GET['g_language'] : ein;
require ($langFileLocation . /langmobileorig.php);
$LZLANGEN = $LZLANG;
if (file_exists($langFileLocation . /langmobile . $language . .php)) {
require ($langFileLocation . /langmobile . $language . .php);
}

The g_language GET parameter is not validated before using it in a php
require function call. This allows to include files that are stored on a
windows server. It is, in this case, not possible to include files, if
the php application is running on a linux server because /langmobile+
the language is not a directory and therefore cannot be traversed. In
recent PHP versions null bytes are blocked. This means that in this case
only files with the PHP extension can be included. Older PHP versions
will allow null bytes in the URL and therefore allow Remote Code
Execution attacks involving httpd log files or /proc/pid/environ and
other techniques to transform this Local File Inclusion into a full
Remote Code Execution on Windows and Linux.

On Windows systems with PHP versions installed that allow null bytes in
the URL it is possible to turn this local file inclusion vulnerability
to a full remote code execution vulnerability. This can be done by
traversing directories and accessing the apache log file with having the
injected the string that follows using a GET request into the log file.
As the screendump shows full code execution in this case executing
calc.exe on windows is possible.

A working exploit for this vulnerability is found in the Appendix of
this documents. The error.log or access.log path has to be known prior
to running the exploit.

3. Proof of Concept Codes:

Code execution URL sample:
$nc <target> 80
GET /index.php?test=<?php system($_GET[cmd]); ?> HTTP/1.1
Host: <target>
<return>
<return>

4. Solution

Download and install latest version:
https://www.livezilla.net/downloads/pubfiles/LiveZilla_5.1.0.0_Full.exe

5. Report Timeline

18.10.2013 Informed Vendor about Issue
12.11.2013 Vendor informed about the fixed new version
15.11.2013 Disclosed to public
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2017-03-20 "phplist 3.2.6 - SQL Injection" webapps php "Curesec Research Team"
2016-11-21 "Mezzanine 4.2.0 - Cross-Site Scripting" webapps python "Curesec Research Team"
2016-11-21 "FUDforum 3.0.6 - Cross-Site Scripting / Cross-Site Request Forgery" webapps php "Curesec Research Team"
2016-11-21 "FUDforum 3.0.6 - Local File Inclusion" webapps php "Curesec Research Team"
2016-11-21 "LEPTON 2.2.2 - Remote Code Execution" webapps php "Curesec Research Team"
2016-11-21 "LEPTON 2.2.2 - SQL Injection" webapps php "Curesec Research Team"
2016-11-10 "MyBB 1.8.6 - Cross-Site Scripting" webapps php "Curesec Research Team"
2016-09-19 "MyBB 1.8.6 - SQL Injection" webapps php "Curesec Research Team"
2016-09-19 "Kajona 4.7 - Cross-Site Scripting / Directory Traversal" webapps php "Curesec Research Team"
2016-03-17 "ZenPhoto 1.4.11 - Remote File Inclusion" webapps php "Curesec Research Team"
2016-03-17 "PivotX 2.3.11 - Directory Traversal" webapps php "Curesec Research Team"
2016-02-04 "ATutor 2.2 - Multiple Cross-Site Scripting Vulnerabilities" webapps php "Curesec Research Team"
2016-02-04 "OpenDocMan 1.3.4 - Cross-Site Request Forgery" webapps php "Curesec Research Team"
2015-12-23 "Arastta 1.1.5 - SQL Injection" webapps php "Curesec Research Team"
2015-12-23 "PhpSocial 2.0.0304_20222226 - Cross-Site Request Forgery" webapps php "Curesec Research Team"
2015-12-23 "Grawlix 1.0.3 - Cross-Site Request Forgery" webapps php "Curesec Research Team"
2015-11-16 "XCart 5.2.6 - Code Execution" remote php "Curesec Research Team"
2015-11-16 "ClipperCMS 1.3.0 - Multiple SQL Injections" webapps php "Curesec Research Team"
2015-11-16 "AlegroCart 1.2.8 - Multiple SQL Injections" webapps php "Curesec Research Team"
2015-11-16 "ClipperCMS 1.3.0 - Code Execution" remote php "Curesec Research Team"
2015-11-16 "AlegroCart 1.2.8 - Local/Remote File Inclusion" webapps php "Curesec Research Team"
2015-10-30 "Pligg CMS 2.0.2 - Multiple SQL Injections" webapps php "Curesec Research Team"
2015-10-30 "Pligg CMS 2.0.2 - Cross-Site Request Forgery / Code Execution" webapps php "Curesec Research Team"
2015-10-30 "Pligg CMS 2.0.2 - Directory Traversal" webapps php "Curesec Research Team"
2015-09-17 "ZeusCart 4.0 - SQL Injection" webapps php "Curesec Research Team"
2015-09-17 "ZeusCart 4.0 - Cross-Site Request Forgery" webapps php "Curesec Research Team"
2015-08-18 "BigTree CMS 4.2.3 - (Authenticated) SQL Injection" webapps php "Curesec Research Team"
2015-08-18 "CodoForum 3.3.1 - Multiple SQL Injections" webapps php "Curesec Research Team"
2013-11-18 "LiveZilla 5.0.1.4 - Remote Code Execution" webapps php "Curesec Research Team"
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.