MyBB Profile Wii Friend Code 1.0 Cross Site Scripting and SQL Injection

2013.01.05
Credit: Ichi
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89
CWE-79

# Exploit Title: MyBB Profile Wii Friend Code SQLi/Persistent XSS # Dork: intitle:"Profile of" intext:"Wii Friend Code" inurl:member.php # Date: 1/3/2013 # Exploit Author: Ichi # Vendor Homepage: http://mods.mybb.com/view/profile-wii-friend-code # Software Link: http://mods.mybb.com/download/profile-wii-friend-code # Version: 1.0 # Tested on: Windows 7 64-bit "Profile Wii Friend Code" MyBB plugin is vulnerable to SQL UPDATE Injection and Persistent XSS. The vulnerable code lies here(in profilewfc.php): <?php function profilewfc_update($wfc) { global $mybb; if (isset($mybb->input['wfc'])) { $wfc->user_update_data['wfc'] = $mybb->input['wfc']; } } ?> As you can see the input is not sanitized in the least... Persistent XSS: 1. Go to your user cp and edit your profile - usercp.php?action=profile 2. and at the "Wii Friend Code Wii Friend Code" box enter: <script>alert(1)</script> and then press submit 3. http://prntscr.com/o1x2p, submit, and http://prntscr.com/o1x69 SQL Injection: 1. Go to your user cp and edit your profile - usercp.php?action=profile 2. Enter this into the Wii Friend Code field as you would do with the 1st vulnerability: x', usergroup='4 3. submit and now you belong to whatever usergroup to choice to belong to PoC: Before: http://prntscr.com/o1xkg Exploit: http://prntscr.com/o1xnd Aftermath(now an admin): http://prntscr.com/o1xoj https://twitter.com/TeamDigi7al ~Ichi

References:

http://mods.mybb.com/view/profile-wii-friend-code


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top