lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
From: ulfh at Update.UU.SE (Ulf Harnhammar)
Subject: phpBB SQL Injection vulnerability

phpBB SQL Injection vulnerability


PROGRAM: phpBB
VENDOR: phpBB Group
HOMEPAGE: http://www.phpbb.com/
VULNERABLE VERSIONS: 2.0.3, possibly others
IMMUNE VERSIONS: 2.0.4
LOGIN REQUIRED: yes


DESCRIPTION:

"phpBB is a UBB-style dissussion board written in PHP backended by a
MySQL database. It includes features such as posting/replying/editing
messages, private messages, private forums, user and anonymous
posting, robust theming, user ranking by posts or by special,
admin definable, ranks, and much more."

(direct quote from the program's project page at Freshmeat)

phpBB is published under the terms of the GNU General Public License.
It is a very popular program with lots of installations.


SUMMARY:

phpBB users can send private messages to each other. The program has
got a security hole, making it possible for a user to delete the text
of all private messages stored in the system.


TECHNICAL DETAILS:

The function for deleting private messages has got an SQL Injection
hole. If we submit data saying that we want to delete private
message number "1) OR 1=1 #", the text of all private messages for
all users on the system will be deleted.

The messages are stored in two tables, and the SQL Injection will
only work on one of them, so all the text bodies are deleted but the
subjects and metadata are only deleted if they belong to the current
user. This means that the subjects of the deleted messages will still
show up in the other users' folders. When a user clicks on a deleted
message, he or she will just be redirected back to the folder.

You can exploit this by POSTing the following values to
privmsg.php?folder=inbox&sid=[THE SID VALUE]:

  mode=""
  delete="true"
  mark[]="1) OR 1=1 #"
  confirm="Yes"

The current SID value is shown in the URL field, if you log in to
the system with cookies turned off.


COMMUNICATION WITH VENDOR:

The vendor was contacted on the 14th of January. Version 2.0.4 was
released on the 16th of January.


EXPLOIT:

I have attached a Perl exploit for this issue. It deletes the text
of all private messages. Before starting it, you have to log in
and get the SID value as described above.


// Ulf Harnhammar
   VSU Security
   ulfh@...ate.uu.se

-------------- next part --------------
A non-text attachment was scrubbed...
Name: phpbb-exploit.pl
Type: application/x-perl
Size: 1081 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030117/356a5ae8/phpbb-exploit.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ