Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2006-0450 PoC — phpBB 2.0.19 拒绝服务漏洞

Source
Associated Vulnerability
Title:phpBB 2.0.19 拒绝服务漏洞 (CVE-2006-0450)
Description:phpBB 2.0.19及更早版本存在拒绝服务漏洞,远程攻击者可以通过以下方式使系统拒绝服务(应用程序崩溃):(1)通过profile.php注册许多用户,或(2)使用search.php以某种令数据库无法辨识的方式进行搜索。
Description
CVE-2006-0450. phpBB 2.0.19 and earlier allows remote attackers to cause a denial of service (application crash) by (1) registering many users through profile.php or (2) using search.php to search in a certain way that confuses the database.
Readme
--------------------------------------------------------
[N]eo [S]ecurity [T]eam [NST]® - Advisory #15 - 00/00/06
--------------------------------------------------------
Program:  phpBB 2.0.15

Homepage:  http://www.phpbb.com

Vulnerable Versions: phpBB 2.0.15 & Lower versions

Risk: High Risk!!

Impact: Multiple DoS Vulnerabilities.

---------------------------------------------------------
- Description
---------------------------------------------------------
phpBB is a high powered, fully scalable, and highly customizable
Open Source bulletin board package. phpBB has a user-friendly
interface, simple and straightforward administration panel, and
helpful FAQ. Based on the powerful PHP server language and your
choice of MySQL, MS-SQL, PostgreSQL or Access/ODBC database servers,
phpBB is the ideal free community solution for all web sites.
- Tested
---------------------------------------------------------
localhost & many forums
- Explotation
---------------------------------------------------------
profile.php << By registering as many users as you can.
search.php  << by searching in a way that the db couln't observe it.

CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0450
File Snapshot

[4.0K] /data/pocs/7cf4fa2ada7acd696a4e7705913e5b295123882c ├── [ 34K] LICENSE ├── [7.6K] NsT-phpBBDoS.c └── [1.2K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.