"ADoxx" <ad***@hotmail.com> wrote in message
news:pa****************************@hotmail.com...
Ok everyone, here it is....
After taking heed of Bigcoupe's suggestion on a possible phpBB
vulnerability, I downloaded version 2.0.11 (we were running 2.0.8) and
patched it. We are also on PHP 4.3.10 as well. This is the highest our CMS
will allow us to go, as well as Zend Optimizer (it won't let us use
hardened-PHP). I've got our boards currently disabled and everything seems
to be ok, but will enable them soon to further test.
On that same note, on the phpBB site, there are a few threads of interest:
http://www.phpbb.com/phpBB/viewtopic.php?f=14&t=240513 (the 2.0.11 update
does this for you actually)
http://www.phpadvisory.com/advisories/view.phtml?ID=42
http://www.phpbb.com/phpBB/viewtopic...verevernosanit
y
http://www.phpbb.com/phpBB/viewtopic...verevernosanit
y (this one is a sticky)
http://www.phpbb.com/phpBB/viewtopic...verevernosanit
y
I will post more as I find out if you like. I know its a bit off topic
here, but hoping it might help someone else with the same issue.
Adam
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Technical Cyber Security Alert TA04-356A
Exploitation of phpBB highlight parameter vulnerability
Original release date: December 21, 2004
Last revised: --
Source: US-CERT
Systems Affected
phpBB versions 2.0.10 and prior
Overview
The software phpBB contains an input validation problem in how it
processes a parameter contained in URLs. An intruder can deface a
phpBB website, execute arbitrary commands, or gain administrative
privileges on a compromised bulletin board.
I. Description
phpBB is an open-source bulletin board application. It fails to
properly perform an urldecode() on the "highlight" parameter supplied
to viewtopic.php. This may allow a remote attacker to execute
arbitrary commands on a vulnerable server.
According to reports, this vulnerability is being actively exploited
by the Santy.A worm. The worm appears to propogate by searching for
the keyword "viewtopic.php" in order to find vulnerable sites.
The worm writes itself to a file named "m1ho2of" on the compromised
system. It then overwrites files ending with .htm, .php, .asp. shtm,
.jsp, and .phtm replacing them with HTML content that defaces the web
page. The worm then tries to use PERL to execute itself on the
compromised system and propogate further.
US-CERT is tracking this issue as:
VU#497400 - phpBB viewtopic.php fails to properly sanitize input
passed to the "highlight" parameter
II. Impact
A remote attacker may be able to deface a phpBB website and execute
arbitrary commands on a compromised bulletin board.
III. Solution
Upgrade phpBB
Upgrade to phpBB verison 2.0.11 to prevent exploitation.
Appendix A. References
* US-CERT Vulnerability Note VU#497400 -
<http://www.kb.cert.org/vuls/id/497400>
* phpBB Downloads - < http://www.phpbb.com/downloads.php>
* phpBB Announcement -
<http://www.phpbb.com/phpBB/viewtopic.php?f=14&t=240636>
* Symantec Security Response - Perl.Santy -
<
http://securityresponse.symantec.com...ata/perl.santy
.html>
* McAfee - Computer Virus Software and Internet Security -
<
http://us.mcafee.com/virusInfo/defau...ption&virus_k=
130471>
__________________________________________________ _______________
This vulnerability was reported by the phpBB Development Team.
__________________________________________________ _______________
Feedback can be directed to the authors: Jeffrey Gennari and
Jason Rafail
__________________________________________________ _______________
This document is available from:
<http://www.us-cert.gov/cas/techalerts/TA04-356A.html>
__________________________________________________ _______________
Copyright 2004 Carnegie Mellon University.
Terms of use: <http://www.us-cert.gov/legal.html>
__________________________________________________ _______________
Revision History
Dec 21, 2004: Initial release
Last updated December 21, 2004
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBQci1ihhoSezw4YfQAQLarQf/cyzsvhFzCnqDyzRRqccGx8yG+AUMLQnG
C+eZ3oyfEntqJkMh4ApNb1er8F+7BkHNnhzvPeifqDQPMGwpjL rBnyPr4vSneG3v
JBregSqACGHzR7/TDeDJ94kiBFPty77AS5r6eqsLe0ueaL2kA149lEEcbGjPGd+q
P0my0Jxkal0DPOwGuPyFIcjdGBAYHXqyCbI0hl6DqGGj/vSRkuhjt5EY0K7ShOdV
JaSmRWgkbM0vXtKj+sWCSOLFoDschFzlW+Egke17xf3bIZUwvx 5uNsw8AXZwCiaa
CJNJcL+sI8JvXEQqC5xiAkYgUVDA+WzRGtKoVfkEJBpv8PS0My hX+Q==
=ZLLn
-----END PGP SIGNATURE-----