You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: documentation/modules/exploit/multi/http/mybb_rce_cve_2022_24734.md
+26-68Lines changed: 26 additions & 68 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,17 @@
1
1
## Vulnerable Application
2
2
3
-
This exploit module leverages an improper input validation vulnerability in MyBB prior to `1.8.30` to execute arbitrary code in the context of the user running the application.
3
+
This exploit module leverages an improper input validation vulnerability in
4
+
MyBB prior to `1.8.30` to execute arbitrary code in the context of the user
5
+
running the application.
4
6
5
-
MyBB Admin Control setting page calls PHP `eval` function with an unsanitized user input. The exploit adds a new setting, injecting the payload in the vulnerable field, and triggers its execution with a second request. Finally, it takes care of cleaning up and removes the setting.
7
+
MyBB Admin Control setting page calls PHP `eval` function with an unsanitized
8
+
user input. The exploit adds a new setting, injecting the payload in the
9
+
vulnerable field, and triggers its execution with a second request. Finally, it
10
+
takes care of cleaning up and removes the setting.
6
11
7
-
Note that authentication is required for this exploit to work and the account must have rights to add or update settings (typically, myBB administrator role).
12
+
Note that authentication is required for this exploit to work and the account
13
+
must have rights to add or update settings (typically, myBB administrator
14
+
role).
8
15
9
16
## Installation Steps
10
17
@@ -38,7 +45,7 @@ services:
38
45
version: '3.8'
39
46
```
40
47
- Create `nginx/default.conf`
41
-
```
48
+
```
42
49
upstream mybb {
43
50
server mybb:9000 weight=5;
44
51
}
@@ -71,7 +78,7 @@ version: '3.8'
71
78
fastcgi_param PATH_INFO $fastcgi_path_info;
72
79
}
73
80
}
74
-
```
81
+
```
75
82
- Run `docker-compose up`.
76
83
- Access the application at `http://127.0.0.1:8080/install` and finish the installation process.
0 commit comments