[KAPDA::#34]MyBB1.0.4
HeaderInjection
-------
[KAPDA::#34] - MyBB1.0.4~redirectfunction()~HeaderInjection
KAPDA New advisory
Software: MyBB
Sowtware?s Web Site: http://www.mybboard.com
Versions: 1.0.3
Class: Remote
Status: Unpatched
Exploit: Not Available
Solution: Available
Discovered by: imei addmimistrator
Risk Level: high
Vulnerability:
-------------------
There are some security bugs in MyBB software that allows attacker to perform a HeaderInjection attack.MyBB is prone to Header injection in "many pages" in result of unsentized CRLFs and other meaningfull characters in embeding usersuplied varables in header of HTTP while redirecting.
possible attacks against this type of injection are: XSS,cache poisoning, hijacking pages and etc...
we suggest vendor to validate this characters in redirect function for immediate patch and for future versions validate usersuplied varables in embeding data in headers.
Exploit:
--------------------
send a request to some pages that need refferer while redirecting.
POST
Refferer: %0d%0a%0d%0ai+am+here
even if friendly redirecting feature was off, all of pages that embede user supleid data can exploit.
Solution:
--------------------
Upgrade to vendore provided patch.
sugeston:
inc/function.php{306}
before 324 insert
$url = str_replace(array("\n","\r",";"), "", $url);
Credit :
--------------------
Discovered by imei addmimistrator
imei(4}kapda(O}ir
addmimistrator(4}gmail(O}com
www.myimei.com
Computer Security Science Researchers Institute
[http://www.KAPDA.ir]