header-logo
Suggest Exploit
vendor:
Phorum
by:
Brian Moon
7.5
CVSS
HIGH
Remote File Access
200
CWE
Product Name: Phorum
Affected Version From: Phorum 3.3.1
Affected Version To: Phorum 3.4.2
Patch Exists: YES
Related CWE: N/A
CPE: a:phorum:phorum:3.3.1
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: All
2002

Phorum Remote File Access Vulnerability

A problem with Phorum can allow remote users access to restricted files on the local system. This is due to the handling of passwords by the program. By sending a custom crafted string to the admin.php3 script, it's possible to change the administrative password of the board without verification of the users credentials. The "default .langname name" field in the Master settings can then be changed to any file of the users liking, which upon reload, will be output as the page. This problem makes it possible for a user with malicious motives to take control of the message board, read any file on the system, and potentially gain remote access.

Mitigation:

Ensure that the admin.php3 script is not accessible to unauthorized users and that the default .langname name field is not set to any file that can be accessed by malicious users.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/2271/info

Phorum is a popular, free, open source software package originally written by Brian Moon. The package is designed to add chat/bulletin board style interaction between visitors of a web site.

A problem with Phorum can allow remote users access to restricted files on the local system. This is due to the handling of passwords by the program. By sending a custom crafted string to the admin.php3 script, it's possible to change the administrative password of the board without verification of the users credentials. The "default .langname name" field in the Master settings can then be changed to any file of the users liking, which upon reload, will be output as the page. This problem makes it possible for a user with malicious motives to take control of the message board, read any file on the system, and potentially gain remote access. 

First, send the following URL to Phorum, which changes the password to flow:

http://www.example.com/admin.php3?step=4&option=pass&confirm=flow&newPssword=flow

Next, after gaining administrative access to the system, enter the "Master Settings" menu, and set the "default .langfile name" to the following:

../../../../../../../../../../../etc/passwd

This will make the contents of the /etc/passwd file viewable.