lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20050301004507.12853.qmail@www.securityfocus.com>
Date: 1 Mar 2005 00:45:07 -0000
From: Raven <raven@...-security.com>
To: bugtraq@...urityfocus.com
Subject: Software PBLang 4.63 sendpm.php reply file read vulnerability




 [][][][][][][][][][][][][][][][][][][][][][][][][][]
[][][] 
 []  
 [] HRG - Hackerlounge Research Group 
 [] Release: HRG008 
 [] Monday 03/01/05 
 [] Software PBLang 4.63 sendpm.php reply file read  
 []  
 [] The author can't be held responsible for any 
damage  
 [] done by a reader. You have your own resonsibility  
 [] Please use this document like it's meant to.  
 []  
 [][][][][][][][][][][][][][][][][][][][][][][][][][]
[][][]  
  
 Vulnerable: PBLang 4.63 (and earlier?)  
  
  
 ---  
  
 General information:  
  
 PBLang is an international BBS-software based on 
PHP. It does not require any database but bases on a 
flatfile system. Many professional features. More 
info on the project website.  
  
  
 ---  
  
 Description:  
  
 This is bad. sendpm.php contains a flaw that allows 
a registered (and logged in) user to view other users 
password hashes, as well as their PM's and other 
files on the forum (and outside of the forum 
directory even). An attacker can compromise the 
target system without any trouble using this.  
  
  
 ---  
  
 Proof Of Concept:  
  
 http://localhost/pblang/sendpm.php?to=[username]&subj=[doesnt 
matter]&num=1&orig=/home/public_html/pblang/db/members/[username]  
 will load [username]'s entire account information 
including the MD5'ed password hash and maybe hidden 
email information. It will be shown in webpages 
source code, not in the page itself, so right click 
and view page source.  
  
 Including /etc/passwd is possible aswell, as is any 
file on the server.  
  
  
 ---  
  
 Fix and Vendor status:  
  
 Vendor has been notified, expect official patch 
soon. 
  
 
 ---  
 
Greetz: 
 
All the people at hackerlounge.com, JWT, 
TGS-Security.com and JWT-Security.net. 
Specifically: 
 
Th3_R@v3n (me), Dlab, Riddick, Enjoi, Blademaster, 
Modzilla, Pingu, Jake Johnson, Afterburn, airo, 
cardiaC, chis, ComputerGeek, deep_phreeze, dudley, 
evasion, eXtacy, Mattewan, Afterburn, 
Thanatos_Starfire, Roz, Sirross, UmInAsHoE, Infinite, 
Slarty, NoUse, Snake (I hate you), Surreal (I hate 
you), -=Vanguard=-, The_IRS, puNKiey, driedice, 
Carnuss, oKiDaN, Mr.Mind, dementis, net-RIDER, 
voteforpedro, Cryptic_Override, kodaxx, 
~CreEpy~NoDquE~, Brainscan, the_exode, 
phillysteak12345, DerrtyJake, =>HeX<=, m0rk, and 
anyone else I forgot.  
 
 
--- 
 
Credit: 
 
HRG - Hackerlounge Research Group 
http://www.Hackerlounge.com  
 
 
 [][][][][][][][][][][][][][][][][][][][][][][][][][]
[][][]  
 []  
 [] HRG - Hackerlounge Research Group 
 [] Release: HRG008 
 [] Monday 03/01/05 
 [] Software PBLang 4.63 sendpm.php reply file read  
 []  
 [] The author can't be held responsible for any 
damage  
 [] done by a reader. You have your own resonsibility  
 [] Please use this document like it's meant to.  
 []  
 [][][][][][][][][][][][][][][][][][][][][][][][][][]
[][][] 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ