Seite 1 von 1

Vulnerable Attachment module

Verfasst: 27.11.2004 15:11
von Lodda
Ich wollt es einfach mal loswerden, falls dies unerwünscht ist kann dies natürlich gelöscht werden ;)

Code: Alles auswählen

From: zee@psybnc.it
To: bugtraq@securityfocus.com
Subject: Phpbb id: 10701 update and Attachmodule add-on Directory Traversal

Phpbb: All vulnerable all except 2.0.11
Attachment module: All version vulnerable 
Howdark update opened wide my eyes with his nice exploit: 
Bugtraq id: 10701 
-----
viewtopic.php?t=1&highlight=%2527
----- 
Looking at the code I saw that was possible inject any type of Sql query with a multiple char() functions. 
The following code can add an username with admin rights executing this query: 
INSERT INTO phpbb_users(user_id,user_active,username,user_password,user_level) VALUES ('99999','1','ze3lock','ba3c83348bddf7b368b478ac06d3340e','1') 
And will be added to phpbb_users a new user with admin rights. 
*Note we can only execute a working query if we know the tables name. If not we can't. So this work only with a standard installation (usually 95% of websites ;-) 
username: ze3lock
pass: thepass 
The exploit can be run without being logged in and then you can have access with username. So it's quite simple to make it part of a script that could make backdoors around the web. 
For make it working just use the id of a working thread (in this case the thread is 30 - you can see it from the message) 
--- Code start ---- 
http://site.com/forum/viewtopic.php?t=30&highlight=%2527%252emysql_query.....usw.....usw.....usw.... 
--- code end --- 
------------ Attach Module ---------------- 

In the attach module, I found a directory traversal in the "UPLOAD_DIR" field. 
This is the directory where all attachments are supposted to be uploaded. 
The field accept any kind of character so you can put instead of 'files' '../../' and all the attachments will be uploaded in the '../..? directory. 
That's really dangerous for defacements threat. 

--------------- Suggestion ------------------ 
Please, upgrade to version 2.0.11 and add an input validation to UPLOAD_DIR field in attach module. 
Zeelock
Kann das sein oder ist das mal wieder eine Finte?

Verfasst: 27.11.2004 15:36
von kratzer54847
jupp das ist die Hauptsicherheitslücke die in phpBB 2.0.11 gefixed wurde :wink:

Meinte den Attachment Vuln.

Verfasst: 27.11.2004 16:04
von Lodda
Naja aber wie siehts mit dem Attach Vuln. aus?

Verfasst: 27.11.2004 17:12
von kratzer54847
da wendest du dich besser an AcydBUrn

http://www.opentools.de

hmm...

Verfasst: 27.11.2004 17:18
von Lodda
Eher die, die den Attachment Mod installiert haben ;)

Verfasst: 27.11.2004 17:21
von kratzer54847
:D AcydBurn ist der Entwickler des Mods