Login Register






The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 0 Vote(s) - 0 Average


MyBB Admin Escalation Exploit filter_list
Author
Message
MyBB Admin Escalation Exploit #1
Posted on February 6, 2013
Affected URL: {$mybb->settings['bburl']}/merge/index.php
Exploit Type: Unauthenticated Execution
Versions Affected: Merge System <= 1.6.7, MyBB <= 1.6.9

Details:
The MyBB merge system asks for no authentication information when doing a merge, just the database information of the source. This is exploitable by merging a MyBB database with a known admin access userpass combo. This can easily be created by making a new vanilla mybb board. The only requirement is the database it’s on is accessible by the slave server. The best way to eliminate this exploit is require some sort of userpass combination on the Merge system.

Exploit credits: Rallias/Nohbody
*He gave me permission to post this here*
[Image: BAvhP6h.png]
Code:
[5:42:25 PM] i0xillusi0n: Breshie don't bust a nut over chloe now
[5:42:31 PM] Entity: fapfapfapfapfapfapfapfapfapfap
[5:42:33 PM] Jigglypuff | SL: EWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWW

Reply

RE: MyBB Admin Escalation Exploit #2
Great find, did you alert Anar about this?

Reply

RE: MyBB Admin Escalation Exploit #3
(02-07-2013, 02:32 AM)Kinanizer Wrote: Great find, did you alert Anar about this?

This isn't anything new. The MyBB developer's instructions tell you to delete the merge system after using it. Unfortunately, some people aren't all that smart, and they can't follow simple directions. I've known about this for quite some time, which is why we don't have a /merge/ directory. Then again, I haven't had to merge anything.
[Image: fSEZXPs.png]

Reply







Users browsing this thread: 1 Guest(s)