Waraxe IT Security Portal  
  Login or Register
::  Home  ::  Search  ::  Your Account  ::  Forums  ::   Waraxe Advisories  ::  Tools  ::
March 28, 2024
Menu
 Home
 Logout
 Discussions
 Forums
 Members List
 IRC chat
 Tools
 Base64 coder
 MD5 hash
 CRC32 checksum
 ROT13 coder
 SHA-1 hash
 URL-decoder
 Sql Char Encoder
 Affiliates
 y3dips ITsec
 Md5 Cracker
 User Manuals
 AlbumNow
 Content
 Content
 Sections
 FAQ
 Top
 Info
 Feedback
 Recommend Us
 Search
 Journal
 Your Account



User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9145

People Online:
Visitors: 615
Members: 0
Total: 615
PacketStorm News
·301 Moved Permanently

read more...
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> PhpBB -> Found a phpBB2.0.23 exploit, how to implement?
Post new topic  Reply to topic View previous topic :: View next topic 
Found a phpBB2.0.23 exploit, how to implement?
PostPosted: Tue Feb 02, 2010 7:58 pm Reply with quote
KellKheraptis
Regular user
Regular user
 
Joined: Feb 02, 2010
Posts: 5




I found a session hijack exploit thru google for the proper phpbb version of the forum in question, but have a few questions :

    What is the csrf referred to in the end of this procedure :
    "...if the attacker have a good day and the admin close the thread, he can use all admin-functions with csrf."

    Can this be implemented through a shoutbox, as that is all that is visible to non-approved members and guests?


Thanks!

~K

EDIT : If it helps, here's the top header of the exploit :
Code:
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
phpBB 2.0.23 Session Hijacking Vulnerability                +
found by NBBN                 13 Mar 2008                   +
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Not my work in the least, as stated in the header, this is simply a reference so you know which one I'm talking about. If you need the whole thing, I can copy/paste into a spoiler or link the site I got it from (which didn't appear to have anything malicious, and I use an up-to-date Avast AV).
View user's profile Send private message Yahoo Messenger
PostPosted: Tue Feb 16, 2010 4:27 am Reply with quote
KellKheraptis
Regular user
Regular user
 
Joined: Feb 02, 2010
Posts: 5




Two weeks without a reply...I'm gonna venture a guess this version is pretty secure?
View user's profile Send private message Yahoo Messenger
PostPosted: Tue Feb 16, 2010 8:48 pm Reply with quote
waraxe
Site admin
Site admin
 
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




KellKheraptis wrote:
Two weeks without a reply...I'm gonna venture a guess this version is pretty secure?

I did fast look at that advisory and basically it's the way to steal admin or moderator session ID. Nothing difficult to exploit, you just need good timing, because session ID will be invalid soon.
About CSRF:

http://en.wikipedia.org/wiki/Csrf
http://en.wikipedia.org/wiki/Confused_Deputy

Many webapps are protected against CSRF. If phpbb 2.x is not protected against CSRF via GET, then you just place special "image" to the forum post and when admin is logged on and sees that posting, then job will be done. Typical CSRF, nothing special. But if I remember correctly, then most useful functionality in phpbb admin interface goes through POST, so image method can be useless.
Best way to exploit specific session id leakage vulnerability is to write special script. This script will reside on attackers webserver and when admin closes that thread, then remote script will get to know admin's session ID. And next step can be for example POST request, which will add new admin with credentials known to the attacker. Because script can work fast, then session id is still valid - admin does not have logged out yet ...
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Thu Feb 18, 2010 7:52 am Reply with quote
KellKheraptis
Regular user
Regular user
 
Joined: Feb 02, 2010
Posts: 5




waraxe wrote:
KellKheraptis wrote:
Two weeks without a reply...I'm gonna venture a guess this version is pretty secure?

I did fast look at that advisory and basically it's the way to steal admin or moderator session ID. Nothing difficult to exploit, you just need good timing, because session ID will be invalid soon.
About CSRF:

http://en.wikipedia.org/wiki/Csrf
http://en.wikipedia.org/wiki/Confused_Deputy

Many webapps are protected against CSRF. If phpbb 2.x is not protected against CSRF via GET, then you just place special "image" to the forum post and when admin is logged on and sees that posting, then job will be done. Typical CSRF, nothing special. But if I remember correctly, then most useful functionality in phpbb admin interface goes through POST, so image method can be useless.
Best way to exploit specific session id leakage vulnerability is to write special script. This script will reside on attackers webserver and when admin closes that thread, then remote script will get to know admin's session ID. And next step can be for example POST request, which will add new admin with credentials known to the attacker. Because script can work fast, then session id is still valid - admin does not have logged out yet ...


Hmm, good to know, especially if the admin in question ever opens the first stage of membership. As it stand now though, I don't think it will function on the forum without getting into that first stage. The shoutbox is all that is visible (and the memberlist) to guests and registered members the admin hasn't given any permissions to, so the actual forums are still unavailable. Perhaps there's a means of getting permissions without or before getting the admin's sessionID?
View user's profile Send private message Yahoo Messenger
PostPosted: Thu Mar 18, 2010 10:59 am Reply with quote
KellKheraptis
Regular user
Regular user
 
Joined: Feb 02, 2010
Posts: 5




Ok, maybe this will help. The site is below :

secretfans.com
View user's profile Send private message Yahoo Messenger
Found a phpBB2.0.23 exploit, how to implement?
  www.waraxe.us Forum Index -> PhpBB
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT  
Page 1 of 1  

  
  
 Post new topic  Reply to topic  




Powered by phpBB © 2001-2008 phpBB Group






Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2020 Janek Vind "waraxe"
Page Generation: 0.119 Seconds