phpBB SQL Injection vulnerability

From: Ulf Harnhammar (ulfhat_private)
Date: Thu Jan 16 2003 - 19:00:10 PST

  • Next message: securityat_private: "Security Update: [CSSA-2003-002.0] Linux: Webmin Cross-site Scripting and Session ID Spoofing Vulnerabilities"

    phpBB SQL Injection vulnerability
    
    
    PROGRAM: phpBB
    VENDOR: phpBB Group
    HOMEPAGE: http://www.phpbb.com/
    VULNERABLE VERSIONS: 2.0.3, possibly others
    IMMUNE VERSIONS: 2.0.4
    LOGIN REQUIRED: yes
    
    
    DESCRIPTION:
    
    "phpBB is a UBB-style dissussion board written in PHP backended by a
    MySQL database. It includes features such as posting/replying/editing
    messages, private messages, private forums, user and anonymous
    posting, robust theming, user ranking by posts or by special,
    admin definable, ranks, and much more."
    
    (direct quote from the program's project page at Freshmeat)
    
    phpBB is published under the terms of the GNU General Public License.
    It is a very popular program with lots of installations.
    
    
    SUMMARY:
    
    phpBB users can send private messages to each other. The program has
    got a security hole, making it possible for a user to delete the text
    of all private messages stored in the system.
    
    
    TECHNICAL DETAILS:
    
    The function for deleting private messages has got an SQL Injection
    hole. If we submit data saying that we want to delete private
    message number "1) OR 1=1 #", the text of all private messages for
    all users on the system will be deleted.
    
    The messages are stored in two tables, and the SQL Injection will
    only work on one of them, so all the text bodies are deleted but the
    subjects and metadata are only deleted if they belong to the current
    user. This means that the subjects of the deleted messages will still
    show up in the other users' folders. When a user clicks on a deleted
    message, he or she will just be redirected back to the folder.
    
    You can exploit this by POSTing the following values to
    privmsg.php?folder=inbox&sid=[THE SID VALUE]:
    
      mode=""
      delete="true"
      mark[]="1) OR 1=1 #"
      confirm="Yes"
    
    The current SID value is shown in the URL field, if you log in to
    the system with cookies turned off.
    
    
    COMMUNICATION WITH VENDOR:
    
    The vendor was contacted on the 14th of January. Version 2.0.4 was
    released on the 16th of January.
    
    
    EXPLOIT:
    
    I have attached a Perl exploit for this issue. It deletes the text
    of all private messages. Before starting it, you have to log in
    and get the SID value as described above.
    
    
    // Ulf Harnhammar
       VSU Security
       ulfhat_private
    
    
    
    



    This archive was generated by hypermail 2b30 : Sun Jan 19 2003 - 20:21:58 PST