Waraxe IT Security Portal
Login or Register
November 22, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 57
Members: 0
Total: 57
Full disclosure
APPLE-SA-11-19-2024-5 macOS Sequoia 15.1.1
Local Privilege Escalations in needrestart
APPLE-SA-11-19-2024-4 iOS 17.7.2 and iPadOS 17.7.2
APPLE-SA-11-19-2024-3 iOS 18.1.1 and iPadOS 18.1.1
APPLE-SA-11-19-2024-2 visionOS 2.1.1
APPLE-SA-11-19-2024-1 Safari 18.1.1
Reflected XSS - fronsetiav1.1
XXE OOB - fronsetiav1.1
St. Poelten UAS | Path Traversal in Korenix JetPort 5601
St. Poelten UAS | Multiple Stored Cross-Site Scripting in SEH utnserver Pro
Apple web content filter bypass allows unrestricted access to blocked content (macOS/iOS/iPadOS/visionO S/watchOS)
SEC Consult SA-20241112-0 :: Multiple vulnerabilities in Siemens Energy Omnivise T3000 (CVE-2024-38876, CVE-2024-38877, CVE-2024-38878, CVE-2024-38879)
Security issue in the TX Text Control .NET Server for ASP.NET.
SEC Consult SA-20241107-0 :: Multiple Vulnerabilities in HASOMED Elefant and Elefant Software Updater
Unsafe eval() in TestRail CLI
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> PhpBB -> Any working exploits for phpBB 2.0.14? Goto page Previous1, 2
Post new topicReply to topic View previous topic :: View next topic
PostPosted: Thu May 12, 2005 1:58 pm Reply with quote
lone_wolf
Regular user
Regular user
Joined: Feb 20, 2005
Posts: 9




shai-tan wrote:
Thats how I found this site too same advisory too. He had done it wrong on purpose. Only 25 Characters of the users MD5 came out of it.


Yes, my thought exactly. But, that didn't help much - that exploit have started a line of highest risk exploits that made good old PhpBB one of the most unsecure boards at the moment

shai-tan wrote:

Warez and Ares are P2Ps they have chat rooms on them for heaps of different subjects there are tonnes of "hacking" ones on it.


Ugh. I've heard much of that kind of places but never stumbled upon it myself

Hopefully.
View user's profile Send private message
PostPosted: Fri May 13, 2005 2:18 am Reply with quote
jearthree
Regular user
Regular user
Joined: May 10, 2005
Posts: 6




Does anyone know if castlecop released the exploit?
View user's profile Send private message
Re
PostPosted: Wed Jun 01, 2005 10:36 pm Reply with quote
mister
Beginner
Beginner
Joined: Jun 02, 2005
Posts: 4




Does anyone know if castlecop released the exploit?
View user's profile Send private message
PostPosted: Thu Jun 02, 2005 4:20 pm Reply with quote
Injector
Active user
Active user
Joined: Dec 29, 2004
Posts: 49




This sites not bad but abit too open for skiddies though, like showing them some proof of concept instead of just showing them the bug. Now all they have to do is stick those characters to the URL. sad....sad....sad......

Then the worst part is when they ask question like this ones

Is there any exploit for this software?
View user's profile Send private message
PostPosted: Sun Jun 05, 2005 1:40 pm Reply with quote
dfenzz
Beginner
Beginner
Joined: Jun 05, 2005
Posts: 1




*INTRODUCTION

phpBB is a popular bulletin board system based on PHP. There is a lack of
filtering for the BBCODE URL. Initially discovered: encapsulating a
specially crafted URL, a user caught clicking on the resulting hyperlinks
can have their registry entries modified without their knowledge [huge
hazard!], among other things. Originally successfully tested with
"javascript://", but subsequent discovery showed that "applet://",
"about://", "activex://", "chrome://", and "script://" may be able to get
thru as well with the URL enclosure or not (of course, browser dependant).

It is recommended that these types of URIs not be allowed to render at all
in the phpBB system as the possible user computer hijacking can be
gargantuan. There is enough hijacking in spyware products (ref:
http://castlecops.com/f67-Hijackthis_Spyware_Viruses_Worms_Trojans_Oh_My.html
).

*PROOF OF CONCEPT

This POC uses the URL encapsulation:

Alert box with "CouCou"

Create registry entry: HKCU\QQQQQ\qq = "CouCou"

Modify opener page: Paul -> P.A.U.L

If you click on the second link, be sure to find and remove the "QQQQQ"
entry in your Windows Registry. However, we recommend you do not click
expect for developer testing and patching.
View user's profile Send private message
Any working exploits for phpBB 2.0.14?
www.waraxe.us Forum Index -> PhpBB
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 2 of 2
Goto page Previous1, 2
Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.045 Seconds