myBB version 1.6.4 was distributed with an unauthorized backdoor embedded in the source code. The backdoor allowed remote attackers to execute arbitrary PHP code by injecting payloads into a specially crafted collapsed cookie. This vulnerability was introduced during packaging and was not part of the intended application logic. Exploitation requires no authentication and results in full compromise of the web server under the context of the web application.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/mybb_backdoor.rb | product exploit |
https://www.exploit-db.com/exploits/17949 | exploit |
https://web.archive.org/web/20111015224948/http://secunia.com/advisories/46300/ | third party advisory |
https://blog.mybb.com/2011/10/06/1-6-4-security-vulnerabilit/ | vendor advisory patch |
https://www.vulncheck.com/advisories/mybb-backdoor-arbitrary-command-execution | third party advisory |