Skip to content

Latest commit

 

History

History

CVE-2017-14596

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 
 
 
 
 

Joomla 3.7.5 LDAP Information Disclosure Vulnability(CVE-2017-14596)

Introduction

A LDAP injection was discoverd by RISP, it can be used to burp the username and password of joomla if the default LDAP plugin was configured.

The poc looks like

XXX;!(|(!(uid=user*))(!(userPassword=password*)))

A presentation video can be found on twitter

Setup

Run

docker-compose up

Install joomla with

Host Name: mysql:3306
Database Name: joomla
Database Username: root
Database Password: root

After installation, delete the folder /var/www/html/plugins/quickicon/phpversionchecker in joomla container.

Login in with your admin account and enable default LDAP plugin, and configure as below

Host: openldap
Port: 1389
LDAP V3: Yes
Negotiate TLS: No
Follow Referrals: No
Authorisation Method: Bind and Search
Base DN: dc=example,dc=org
Search String: uid=[search]
User's DN: cn=[username],ou=users,dc=example,dc=org
Connect Username:
Connect Password:
Map: Full Name: fullName
Map: Email: mail
Map: User ID: uid

save and close it.

Now we need to create a new user in super Users groups with same name of our openldap server (but not same password), in this case it's user01.

After that, your can logout and try to burp the user01 and it password.

References

  1. https://docs.joomla.org/J2.5:LDAP_Authentication#Example_Configuration
  2. https://community.joomla.org/blogs/community/joomla-ldap-authentications-plugin-window-2003-server-active-directory-configuration.html
  3. http://www.joomlachina.cn/social/?/question/5242