The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


US-CERT Technical Cyber Security Alert TA04-356A -- Exploitation of phpBB highlight parameter vulnerability


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Tue, 21 Dec 2004 18:59:25 -0500
From: CERT Advisory <cert-advisory@cert.org.>
To: [email protected]
Subject: US-CERT Technical Cyber Security Alert TA04-356A -- Exploitation of phpBB highlight parameter vulnerability


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

         Technical Cyber Security Alert TA04-356A 
    Exploitation of phpBB highlight parameter vulnerability


   Original release date: December 21, 2004
   Last revised: --
   Source: US-CERT

Systems Affected

   phpBB versions 2.0.10 and prior

Overview

   The software phpBB contains an input validation problem in how it
   processes a parameter contained in URLs. An intruder can deface a
   phpBB website, execute arbitrary commands, or gain administrative
   privileges on a compromised bulletin board.

I. Description

   phpBB is an open-source bulletin board application. It fails to
   properly perform an urldecode() on the "highlight" parameter supplied
   to viewtopic.php. This may allow a remote attacker to execute
   arbitrary commands on a vulnerable server.

   According to reports, this vulnerability is being actively exploited
   by the Santy.A worm. The worm appears to propogate by searching for
   the keyword "viewtopic.php" in order to find vulnerable sites.

   The worm writes itself to a file named "m1ho2of" on the compromised
   system. It then overwrites files ending with .htm, .php, .asp. shtm,
   .jsp, and .phtm replacing them with HTML content that defaces the web
   page. The worm then tries to use PERL to execute itself on the
   compromised system and propogate further.
   US-CERT is tracking this issue as:

   VU#497400 - phpBB viewtopic.php fails to properly sanitize input
   passed to the "highlight" parameter

II. Impact

   A remote attacker may be able to deface a phpBB website and execute
   arbitrary commands on a compromised bulletin board.

III. Solution

Upgrade phpBB

   Upgrade to phpBB verison 2.0.11 to prevent exploitation.

Appendix A. References

     * US-CERT Vulnerability Note VU#497400 - 
       <http://www.kb.cert.org/vuls/id/497400>;
     * phpBB Downloads - < http://www.phpbb.com/downloads.php>;
     * phpBB Announcement - 
       <http://www.phpbb.com/phpBB/viewtopic.php?f=14&t=240636>;
     * Symantec Security Response - Perl.Santy - 
       <http://securityresponse.symantec.com/avcenter/venc/data/perl.santy
       .html>
     * McAfee - Computer Virus Software and Internet Security -
       <http://us.mcafee.com/virusInfo/default.asp?id=description&virus_k=
       130471>
   _________________________________________________________________


   This vulnerability was reported by the phpBB Development Team.
   _________________________________________________________________

   Feedback can be directed to the authors: Jeffrey Gennari and 
   Jason Rafail
   _________________________________________________________________

   This document is available from:
   
      <http://www.us-cert.gov/cas/techalerts/TA04-356A.html>;
   
   _________________________________________________________________

   Copyright 2004 Carnegie Mellon University.
   
   Terms of use: <http://www.us-cert.gov/legal.html>;
   _________________________________________________________________

   Revision History

   Dec 21, 2004: Initial release

                      Last updated December 21, 2004 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)


iQEVAwUBQci1ihhoSezw4YfQAQLarQf/cyzsvhFzCnqDyzRRqccGx8yG+AUMLQnG
C+eZ3oyfEntqJkMh4ApNb1er8F+7BkHNnhzvPeifqDQPMGwpjLrBnyPr4vSneG3v
JBregSqACGHzR7/TDeDJ94kiBFPty77AS5r6eqsLe0ueaL2kA149lEEcbGjPGd+q
P0my0Jxkal0DPOwGuPyFIcjdGBAYHXqyCbI0hl6DqGGj/vSRkuhjt5EY0K7ShOdV
JaSmRWgkbM0vXtKj+sWCSOLFoDschFzlW+Egke17xf3bIZUwvx5uNsw8AXZwCiaa
CJNJcL+sI8JvXEQqC5xiAkYgUVDA+WzRGtKoVfkEJBpv8PS0MyhX+Q==
=ZLLn
-----END PGP SIGNATURE-----


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру