Previous Thread
Next Thread
Print Thread
Rate Thread
#99678 06/26/2003 6:34 PM
Joined: Mar 2001
Posts: 46
Member
Member
Offline
Joined: Mar 2001
Posts: 46
Kann mir jemand mehr hierzu sagen und wie man es fixen kann. bzw. versteh ich noch nicht wie es überhaupt geht.

Vulnerability found in UBB 6.0.x and (possible) in UBB 6.1.x
@ SMS
Dec 03 2001, 16:58 (UTC+0)
From: xatmer :
Vulnerability in Ultimate Bulletin Board 6.0.x and maybe 6.1.x.
Any user can receive passwords of others, having taken advantage of function of a reminder of the password (lost password).

Sorry for my terrible English, I use auto-translator on www.translate.ru.
Algorithm the following.
1. We find email any of existing users on a board.
2. Registration the user with same e-mail
3. We change e-mail on necessary to us
4. We use a button to send the password
5. We receive the password not only required user, but also that whose mail any in the beginning.

It is possible to build the whole chains from emails.
And now the reason: the
File ubb_lib_misc.cgi

sub find_lost {

……………………………………..

# get list of registered emails
my @email_list = &OpenFileAsArray("$vars_config{MembersPath}/emailfile.cgi");

#lowercase the input
my $lc_email = lc($in{email});

# find matches
foreach (@email_list) {
($row_email, $row_un) = split(/||/, $_);
$lc_row_email = lc($row_email);
if ($lc_row_email eq "$lc_email") {
chomp($row_un);
push(@matches, $row_un);
}
}

# now we have matches
$match_total = @matches;

……………………………………….

Apparently from a code, function uses file emailfile.cgi for search of users with required e-mail address. File have the following format
email|public-mail|user_number
there is a pass on structures of the found users and sending of the password of these users on entered e-mail
Further. And now we shall understand, because of what it occurs.
ubb_profile.cgi
Function update_profile

# if email is changing, update emailfile.cgi
undef(@amend);
if ($lc_email ne "$lc_old_email") {

my @emailsfile = &OpenFileAsArray("$vars_config{MembersPath}/emailfile.cgi");

$lc_old_email =~ s/([.|@])/\$1/isg;

#####################################################
#####################################################

foreach $checker(@emailsfile) {
chomp($checker);
if ($checker =~ m/^$lc_old_email||/i) {
($j, $thisnum) = split(/||/, $checker);
$NewLine = "$lc_email||$thisnum";
push(@amend, $NewLine);
} else {
push(@amend, $checker);
}
}

#####################################################
#####################################################

open(FILE, ">$vars_config{MembersPath}/emailfile.cgi");
&lock;
foreach $dos(@amend) {
chomp($dos);
print FILE "$dosn";
}
&unlock;
close(FILE);
chmod (0666, "$vars_config{MembersPath}/emailfile.cgi");
}

we here see a file (interesting piece is allocated with comments), function opens, looked through on presence replaced e-mails, at detection varies, then enters the name. Only it is not taken into account, that someone could enter another's mail and replacement will pass not only at the user, the address which have requested change, and all such addresses.
The given vulnerability is found out in all UBB 6.0.x, 6.1.x was not tested in view of absence of the given version.

The decision of a problem:
In a file ubb_profile.cgi to make the following replacement the
Initial file:

foreach $checker(@emailsfile) {
chomp($checker);
if ($checker =~ m/^$lc_old_email||/i) {
($j, $thisnum) = split(/||/, $checker);
$NewLine = "$lc_email||$thisnum";
push(@amend, $NewLine);
} else {
push(@amend, $checker);
}
}

the changed file:

foreach $checker(@emailsfile) {
chomp($checker);
if ($checker =~ m/^$lc_old_email||/i) {
($j, $thisnum) = split(/||/, $checker);
if($thisnum == $user_number){
$NewLine = "$lc_email||$thisnum";
push(@amend, $NewLine);
}else{
push(@amend,$checker);
}
} else {
push(@amend, $checker);
}
}


(C) 2001 Xatmer [email protected]

Sponsored Links
Entire Thread
Subject Posted By Posted
Sicherheitslücke Mikrokosmos 06/27/2003 1:34 AM
Re: Sicherheitslücke d-talk 06/27/2003 2:43 AM
Re: Sicherheitslücke dj2k 06/30/2003 1:19 AM
Re: Sicherheitslücke Mikrokosmos 10/08/2003 2:46 PM
Re: Sicherheitslücke Stamoulis 10/09/2003 11:29 AM
Re: Sicherheitslücke Mikrokosmos 10/09/2003 1:34 PM
Re: Sicherheitslücke Mikrokosmos 10/09/2003 1:38 PM
Re: Sicherheitslücke martin.away 10/09/2003 3:27 PM
Re: Sicherheitslücke Mikrokosmos 10/10/2003 1:33 PM
Re: Sicherheitslücke Mikrokosmos 10/10/2003 1:39 PM
Re: Sicherheitslücke GMe 01/30/2004 12:14 PM

Link Copied to Clipboard
Donate Today!
Donate via PayPal

Donate to UBBDev today to help aid in Operational, Server and Script Maintenance, and Development costs.

Please also see our parent organization VNC Web Services if you're in the need of a new UBB.threads Install or Upgrade, Site/Server Migrations, or Security and Coding Services.
Recommended Hosts
We have personally worked with and recommend the following Web Hosts:
Stable Host
bluehost
InterServer
Visit us on Facebook
Member Spotlight
isaac
isaac
California
Posts: 1,157
Joined: July 2001
Forum Statistics
Forums63
Topics37,573
Posts293,925
Members13,849
Most Online5,166
Sep 15th, 2019
Today's Statistics
Currently Online
Topics Created
Posts Made
Users Online
Birthdays
Top Posters
AllenAyres 21,079
JoshPet 10,369
LK 7,394
Lord Dexter 6,708
Gizmo 5,833
Greg Hard 4,625
Top Posters(30 Days)
Top Likes Received
isaac 82
Gizmo 20
Brett 7
WebGuy 2
Morgan 2
Top Likes Received (30 Days)
None yet
The UBB.Developers Network (UBB.Dev/Threads.Dev) is ©2000-2024 VNC Web Services

 
Powered by UBB.threads™ PHP Forum Software 8.0.0
(Preview build 20221218)