Waraxe IT Security Portal
Login or Register
June 16, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 45
Members: 0
Total: 45
Full disclosure
SEC Consult SA-20250604-0 :: Local Privilege Escalation and Default Credentials in INDAMED - MEDICAL OFFICE (Medical practice management) Demo version
Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Defense in depth -- the Microsoft way (part 89): user grouppolicies don't deserve tamper protection
CVE-2025-45542: Time-Based Blind SQL Injection in CloudClassroom PHP Project v1.0
ERPNext v15.53.1 Stored XSS in bio Field Allows Arbitrary Script Execution in Profile Page
ERPNext v15.53.1 Stored XSS in user_image Field Allows Script Execution via Injected Image Path
Local information disclosure in apport and systemd-coredump
Stored XSS via File Upload - adaptcmsv3.0.3
IDOR "Change Password" Functionality - adaptcmsv3.0.3
Stored XSS "Send Message" Functionality - adaptcmsv3.0.3
Authenticated File Upload to RCE - adaptcmsv3.0.3
Stored XSS in "Description" Functionality - cubecartv6.5.9
Multiple Vulnerabilities in SAP GuiXT Scripting
CVE-2024-47081: Netrc credential leak in PSF requests library
Exploit CVE-2019-9978: Remote Code Execution in Social Warfare WordPress Plugin (<= 3.5.2)
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> All other software -> IPB 2.x Error
Post new topicReply to topic View previous topic :: View next topic
IPB 2.x Error
PostPosted: Tue Aug 23, 2005 9:10 pm Reply with quote
kyth
Beginner
Beginner
Joined: Aug 23, 2005
Posts: 2




Going to start off by saying i'm almost 90% sure this is not exploitable.. so if you're a script kiddie looking for a freebie.. not in this post.

The only reason i'm bringing this bug up to the public is because it's a very odd bug and I think people could learn from it - also i'm rather confused by it's behavior.

In the search of IPB 2.x you have a variable called lastdate. This is used to put in html at the form at the very bottom right to put 'selected' at the end of the forum id you specify. This way it will know what forum to have selected.

The code is pretty simple and their first mistake was putting an unsanitized user input variable inside regexp.

Now.. I thought it was unsanitized at first, but after later inspection and messing with it some, it appears two spaces would make it so you cannot mess with it at all.

Code:
if ( $_GET['lastdate'] )
{
$lastdate = preg_replace( "#(value=[\"']{".$_GET['lastdate']."}[\"'])#i", "\\1 selected='selected'", $lastdate );
echo $lastdate;
}


If you look at this part:

Code:
.$_GET['lastdate'].


If you space out the two periods, it is completely clean and you will not be able to mess with it. (I think! After spacing them out and trying again, it would no longer give me the errors and not mess with the page)

If you put in | or || into the lastdate variable, the whole page will go whack because you're modifying most of the pages html and breaking a lot of it so some of it will appear.

I thought this may lead to an xss whole, but I don't believe so.

If you do something as such:

&lastdate=){0}(test)|(ljsfdlkj

It will replace all instances of "<b>test</b>" with selected='selected'.
View user's profile Send private message
IPB 2.x Error
www.waraxe.us Forum Index -> All other software
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.035 Seconds