Advertisement






MyBB Profile Blog plugin multiple vulnerabilitie

CVE Category Price Severity
Not specified CWE-20 Not specified High
Author Risk Exploitation Type Date
Not specified High Remote 2012-12-12
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2012120086

Below is a copy:

# Exploit Title: MyBB Profile Blog plugin multiple vulnerabilities.
# Google Dork: inurl:member.php intext:"Profile Blogs" for MyBB
# Date: 12.9.2012
# Exploit Author: Zixem
# Vendor Homepage: http://fklar.pl/
# Software Link: http://mods.mybb.com/view/profile-blogs
# Version: 1.2+
# Tested on: Linux.
 
MyBB Profile Blogs plugin suffers from SQL Injection && Stored XSS.
The vulnerabilities exist withing profileblogs.php which located in /plugins/ folder.
 
 
#################################### SQLi ####################################
 
Instructions:
1. Create a new post in your profile blog.
2. Edit it.
3. Inject in edit GET parameter.
 
Vulnerable part:
<?php
 
/*Line 253*/    $pid = $mybb->input['edit'];
/*Line 259*/    $db->query("UPDATE `".TABLE_PREFIX."blogposts` SET `subject` = '".$subject."', `message` = '".$message."' WHERE `pid` = '".$pid."'");
 
?>
 
How to exploit it:
member.php?action=profile&uid=2&blogpage=1&edit=[VAILD_ID]'[SQLi]
 
PoC: http://i.imgur.com/HY60R.png
 
 
 
+----------------------------------------------------------------------------------------+
 
 
 
#################################### Stored-XSS ####################################
 
The post subject is stored in the database without XSS protection, like this:
<?php
    $subject = addslashes($mybb->input['subject']);
    $db->query("INSERT INTO `".TABLE_PREFIX."blogposts` VALUES (NULL, '".$uid."', '".$dateline."', '".$subject."', '".$message."', '".$ipaddress."')");
?>
 
And also comes out without XSS protection:
 
<?php
/*328*/     while($post = $db->fetch_array($query)) {
/*333*/     $blog .= "<strong style=\"float: left;\">".$post['subject']."</strong><br />";
?>
 
As a result, we're getting Stored-XSS.
 
How to exploit that: http://i.imgur.com/OTIRa.png
PoC: http://i.imgur.com/2Hv9J.png
 
 
Follow: http://twitter.com/z1xem



Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum