--------------------------------------------------------------- ____ __________ __ ____ __ /_ | ____ |__\_____ \ _____/ |_ /_ |/ |_ | |/ \ | | _(__ <_/ ___\ __\ ______ | \ __\ | | | \ | |/ \ \___| | /_____/ | || | |___|___| /\__| /______ /\___ >__| |___||__| \/\______| \/ \/ --------------------------------------------------------------- Http://www.inj3ct-it.org Staff[at]inj3ct-it[dot]org Original Here: http://www.inj3ct-it.org/exploit/pbl.txt --------------------------------------------------------------- PBLang <= 4.99.17.q Remote File Rewriting / Remote Command Execution --------------------------------------------------------------- #By KiNgOfThEwOrLd --------------------------------------------------------------- PoC: PBLang is a flat forum, it doesn't need any database. When we write a new topic, all the topics informations will be saved in a file located in "\db\posts" (a not readeable directory). It looks like a php file, in fact the informations will be saved in this way: The "subject" and the "contenent" values is "htmlentitiesed", so we can't type a malicious code there...but the "image" value is not filtred, so we can execute a malicious code! Don't worry if the directory is not readable, using the directory traversl variable we can make a file where we want, and so we can read that! The file name will be the "fid" value that we send via POST, and the file wont have any estension, it will be like: fid_1 (or something like that). Then, editing the cid value like: "evilfile.php\0", we can make a malicious file. Ps. u gotta use nullbyte not encoded, like: \0 if u try to use %00 it will be not considered like nullbyte ;) --------------------------------------------------------------- Remote Command Execution Exploit (Works only whit Magic Quotes OFF):
--------------------------------------------------------------- Index Rewriting Exploit
---------------------------------------------------------------