Date: Tue, 21 Dec 2004 18:59:25 -0500
From: CERT Advisory <cert-advisory@cert.org.>
To: [email protected]Subject: US-CERT Technical Cyber Security Alert TA04-356A -- Exploitation of phpBB highlight parameter vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Technical Cyber Security Alert TA04-356A
Exploitation of phpBB highlight parameter vulnerability
Original release date: December 21, 2004
Last revised: --
Source: US-CERT
Systems Affected
phpBB versions 2.0.10 and prior
Overview
The software phpBB contains an input validation problem in how it
processes a parameter contained in URLs. An intruder can deface a
phpBB website, execute arbitrary commands, or gain administrative
privileges on a compromised bulletin board.
I. Description
phpBB is an open-source bulletin board application. It fails to
properly perform an urldecode() on the "highlight" parameter supplied
to viewtopic.php. This may allow a remote attacker to execute
arbitrary commands on a vulnerable server.
According to reports, this vulnerability is being actively exploited
by the Santy.A worm. The worm appears to propogate by searching for
the keyword "viewtopic.php" in order to find vulnerable sites.
The worm writes itself to a file named "m1ho2of" on the compromised
system. It then overwrites files ending with .htm, .php, .asp. shtm,
.jsp, and .phtm replacing them with HTML content that defaces the web
page. The worm then tries to use PERL to execute itself on the
compromised system and propogate further.
US-CERT is tracking this issue as:
VU#497400 - phpBB viewtopic.php fails to properly sanitize input
passed to the "highlight" parameter
II. Impact
A remote attacker may be able to deface a phpBB website and execute
arbitrary commands on a compromised bulletin board.
III. Solution
Upgrade phpBB
Upgrade to phpBB verison 2.0.11 to prevent exploitation.
Appendix A. References
* US-CERT Vulnerability Note VU#497400 -
<http://www.kb.cert.org/vuls/id/497400>
* phpBB Downloads - < http://www.phpbb.com/downloads.php>
* phpBB Announcement -
<http://www.phpbb.com/phpBB/viewtopic.php?f=14&t=240636>
* Symantec Security Response - Perl.Santy -
<http://securityresponse.symantec.com/avcenter/venc/data/perl.santy
.html>
* McAfee - Computer Virus Software and Internet Security -
<http://us.mcafee.com/virusInfo/default.asp?id=description&virus_k=
130471>
_________________________________________________________________
This vulnerability was reported by the phpBB Development Team.
_________________________________________________________________
Feedback can be directed to the authors: Jeffrey Gennari and
Jason Rafail
_________________________________________________________________
This document is available from:
<http://www.us-cert.gov/cas/techalerts/TA04-356A.html>
_________________________________________________________________
Copyright 2004 Carnegie Mellon University.
Terms of use: <http://www.us-cert.gov/legal.html>
_________________________________________________________________
Revision History
Dec 21, 2004: Initial release
Last updated December 21, 2004
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBQci1ihhoSezw4YfQAQLarQf/cyzsvhFzCnqDyzRRqccGx8yG+AUMLQnG
C+eZ3oyfEntqJkMh4ApNb1er8F+7BkHNnhzvPeifqDQPMGwpjLrBnyPr4vSneG3v
JBregSqACGHzR7/TDeDJ94kiBFPty77AS5r6eqsLe0ueaL2kA149lEEcbGjPGd+q
P0my0Jxkal0DPOwGuPyFIcjdGBAYHXqyCbI0hl6DqGGj/vSRkuhjt5EY0K7ShOdV
JaSmRWgkbM0vXtKj+sWCSOLFoDschFzlW+Egke17xf3bIZUwvx5uNsw8AXZwCiaa
CJNJcL+sI8JvXEQqC5xiAkYgUVDA+WzRGtKoVfkEJBpv8PS0MyhX+Q==
=ZLLn
-----END PGP SIGNATURE-----