 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 249
Members: 0
Total: 249
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
Help with XSS on phpBB |
 |
Posted: Thu Nov 06, 2008 1:33 pm |
|
|
theanderson |
Regular user |

 |
|
Joined: Nov 03, 2008 |
Posts: 6 |
|
|
|
 |
 |
 |
|
In the target forum I found a vulnerable php script which is prone to XSS.
I ve already coded what I need to get the administrator's cookies.
But before retrieving the admin's cookie, my question is: once I have got the cookie, how do I access the administration panel(*)? And from there what are the things I can do to install a web shell(**)? the forum should be phpBB 2.0.20 (according to /docs/CHANGELOG.html)
(*) I know I have to perform a session hijack, but since then, is the admin panel accessible or I have to input the password anyways?
(**) I ve already used a RCE script (by rgod) but idk if I was able to extract the admin session's id from the cookie (prolly not), where should I look to find the admin session id? does that session id grant me access to the admin panel?
Please I don't wanna beg anyone, but I m tired of searching google and finding nothing. |
|
|
|
|
 |
 |
|
 |
Posted: Thu Nov 06, 2008 1:52 pm |
|
|
waraxe |
Site admin |

 |
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
 |
 |
 |
|
As far as i know, phpbb is checking IP address/session ID match. So if you have stolen sessionID, then you can't use it in most cases.
Now, there is something else you can try. If you can trick admin to visit your website and in same time he's logged in as admin and if you can use XSS hole (classical reflected XSS scenario), then you can actually commit CSRF attack!! Phpbb uses cryptographic nonce as anti-XSRF measure, but XSS will make it useless!! So for example you can make victim's browser to submit new admin creation form - silently and with user data you can provide:)
http://en.wikipedia.org/wiki/XSRF |
|
|
|
|
 |
 |
|
 |
Posted: Thu Nov 06, 2008 2:12 pm |
|
|
theanderson |
Regular user |

 |
|
Joined: Nov 03, 2008 |
Posts: 6 |
|
|
|
 |
 |
 |
|
waraxe wrote: | As far as i know, phpbb is checking IP address/session ID match. So if you have stolen sessionID, then you can't use it in most cases.
Now, there is something else you can try. If you can trick admin to visit your website and in same time he's logged in as admin and if you can use XSS hole (classical reflected XSS scenario), then you can actually commit CSRF attack!! Phpbb uses cryptographic nonce as anti-XSRF measure, but XSS will make it useless!! So for example you can make victim's browser to submit new admin creation form - silently and with user data you can provide:)
http://en.wikipedia.org/wiki/XSRF |
Thanks waraxe,
could you help me building the form I need to create a new admin user on phpBB 2.0.20? (googling in the while...)
EDIT:
Found something at http://hackish.altervista.org/forum/viewtopic.php?t=405
Code: | <html>
<iframe name="hackinginside" frameborder="0" height="0" width="0"></iframe>
<form action="http://site.com/path/groupcp.php?g=[GROUP_ID]" method="post" name="vincy" target="hackinginside">
<input type="hidden" name="username" value="[YOUR_NAME]">
<input type="submit" name="add" value="Add Member"></form>
<script>document.vincy.submit()</script>
</html> |
But I don't know how much could this help me, because the forum's admin doesn't seem to belong to any "group"... |
|
|
|
|
 |
 |
|
 |
Posted: Thu Nov 06, 2008 8:52 pm |
|
|
waraxe |
Site admin |

 |
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
 |
 |
 |
|
Gimme some time, i will try to find best working XSRF solution for this and then post all info here  |
|
|
|
|
www.waraxe.us Forum Index -> PhpBB
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|