Server Side Request Forgery in 'Jabber settings' in Admin Control Panel
Low
P
phpBB
Submitted None
Actions:
Reported by
they
Vulnerability Details
Technical details and impact analysis
## Overview
The 'Jabber settings' panel inside the Administrator Control Panel can be used to access resources that would otherwise only be accessible by the host machine, including resources/services hosted on the `localhost` interface. This can be performed by setting the 'jabber server' parameter to the desired IP address, such as `127.0.0.1` and the port to the desired port. In some cases, service type/version numbers can be gathered as well as this information is printed to screen.
## How to trigger
Set 'jabber server' to 127.0.0.1
Set 'Jabber port' to whatever port you want to check.
Check the 'Enabled' radio button
Click submit
If the port is closed, you will see a socket error message 'Connection refused' error like this:
{F1051582}
Some such as mysqld simply return:
> Could not authorize on Jabber server.
## Example Recording
I have hosted an internal sshd service on `127.0.0.1:2222` to demonstrate that software type and version information is returned to the Administrator Control Panel. I am `ssh`'d into `phpbb-ubuntu`, which is running the aforementioned sshd service in debug mode so you can see the request hit.
{F1051590}
## Setup info
Base OS: Ubuntu 20.04.1
phpbb Version: 3.3.1
{F1051573}
## Impact
An attacker could use this to interact with and enumerate services and resources on behalf of the host machine (including resources hosted on the `localhost` interface). This can be used to port scan and, in some cases, perform service versioning/enumeration on the `localhost` interface as well as on machines hosted on the same network as the phpbb host machine.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Server-Side Request Forgery (SSRF)