what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

fusionBB.txt

fusionBB.txt
Posted Jun 21, 2005
Authored by James Bercegay | Site gulftech.org

FusionBB versions .11 Beta and earlier suffer from local file inclusion and SQL injection flaws.

tags | exploit, local, sql injection, file inclusion
SHA-256 | 24550f3df2baa0ef6d78a486eea8df52ca8d90111ec586881b6e272f2e6bfd8d

fusionBB.txt

Change Mirror Download
##########################################################
# GulfTech Security Research June 6th, 2005
##########################################################
# Vendor : InteractivePHP, Inc
# URL : http://www.fusionbb.com/
# Version : Version .11 Beta And Earlier
# Risk : Multiple Vulnerabilities
##########################################################



Description:
FusionBB is a popular online message board written in php and
developed by InteractivePHP, INC. There are several vulnerabilities
in FusionBB such as SQL Injection and Arbitrary Local File Inclusion.
These issues could allow for an attacker to execute arbitrary scripts
residing on the web server, retrieve sensitive data from the underlying
database, or bypass the FusionBB authentication mechanisms.



Local File Inclusion:
Certain values retrieved from cookie data are not properly sanitized.
One of these unsanitized variables is language. This variable is used
to include local language files, so an attacker could change the value
to contain directory traversal sequences, and append the data with a
null byte (e.g. ../../etc/passwd%00) which could allow for arbitrary
local files to be accessed. Additionally an attacker could exploit this
issue to execute arbitrary scripts residing on the web server.



SQL Injection:
There are a couple of SQL Injection issues present in FusionBB, and one
in particular is very dangerous. The first issue comes when registering
an account with the FusionBB software, and will allow an attacker to
influence an insert statement in the insertUser() function. This is due
to the inputted username not being properly sanitized. Unfortunately the
other SQL Injection issue is much more dangerous and allows an attacker
to not only retrieve arbitrary data from the database such as password
information, but the vulnerability will also allow for an attacker to
easily bypass FusionBB authentication as well as access arbitrary user
accounts. The vulnerability presents itself when an attacker enters an
arbitrary statement in their cookie's session id variable.

Cookie: bb_session_id=' or user_id = '1; bb_uid=1;

For example, the above cookie information sent in an HTTP GET Header
would log us in to the user account with an id of 1.



Solution:
This issues has been fixed and updated in the latest release of the
FusionBB software. The official changelog can be viewed here.

http://www.interactivephp.com/misc/CHANGELOG.html

All users should upgrade their installations as soon as possible. A
special thanks to Joshua Pettit for responding to, and resolving the
issues reported here so quickly.



Related Info:
The original advisory can be found at the following location
http://www.gulftech.org/?node=research&article_id=00081-06132005



Credits:
James Bercegay of the GulfTech Security Research Team
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close