phpBB 2.0.8a and lower - IP spoofing vulnerability
#####################################################################
Advisory Name : phpBB 2.0.8a and lower - IP spoofing vulnerability
Release Date : Apr 18, 2004
Application : phpBB
Version : phpBB 2.0.8a and previous versions
Platform : PHP
Vendor URL : http://www.phpbb.com/
Author : Wang / SRR Project Group of Ready Response (srr@xxxxxxxxxxxxxxxxx)
#####################################################################
Overview
A vulnerability has been reported to exist in the software that may allow a
remote user to spoof/forge their IP address, therefore making the
phpBB/Administrator believe that users/posts are coming from a false IP. The
problem reportedly exists in the code to obtain the users IP address in the
common.php script. This issue is caused by blind trust of the X-Forwarded-For
HTTP header. A remote attacker may exploit this issue to hide their IP address,
or appear under the IP address of another user. It can also be used to bypass
any ban restrictions that an administrator has placed on an IP via the PHPBB
system.
------------------------------------------------
Discussion
There is code in common.php that starts:
//
// Obtain and encode users IP
//
if( getenv('HTTP_X_FORWARDED_FOR') != '' )
{
$client_ip = ( !empty($HTTP_SERVER_VARS['REMOTE_ADDR']) ) ?
$HTTP_SERVER_VARS['REMOTE_ADDR'] : ( ( !empty($HTTP_ENV_VARS['REMOTE_ADDR']) )
? $HTTP_ENV_VARS['REMOTE_ADDR'] : $REMOTE_ADDR );
This code is used to obtain the users/posters IP address. However, if the
X-Forwarded-For HTTP header is present, it will take the IP address from the
header and blindly trust it to be the users/posters IP address. The problem is
of course that the X-Forwarded-For HTTP header is easily forgable via a number
of methods.
To take a trivial example...if a user were to spoof their X-Forwarded-For
header to contain the information:
X-Forwarded-For: 1.3.3.7
When they post on a phpBB board - it blindly trusts that "1.3.3.7" is the users
real IP address, and will present this IP address to the phpBB administrator if
they choose to check the posters IP via the phpBB. Not only does this make it a
pain for the phpBB administrator to then have to track down the users real IP
via httpd server logs (if this is possible, which is not always the case) - it
also makes it possible for a user to forge/spoof their IP to that of another
user in a possible attempt to masquerade as them.
In addition, this makes phpBB's IP ban feature close to useless because anyone
can change their IP and evade the ban within seconds by changing their
X-Forwarded-For header to an IP that is not banned (no need for a proxy).
In my opinion, since phpBB handles getting a users IP address in this way...it
is a security glitch, as it means that IP's can't be trusted by a phpBB
administrator, and bans can be evaded with ease.
------------------------------------------------
Solution
No official response/solution has been recieved from the phpBB group. A
possible solution would be to not trust the X-Forwarded-For HTTP header when
wishing to obtain a valid IP address by which to reference a user/poster.
In common.php find the following code around line 126:
//
// Obtain and encode users IP
//
if( getenv('HTTP_X_FORWARDED_FOR') != '' )
{
$client_ip = ( !empty($HTTP_SERVER_VARS['REMOTE_ADDR']) ) ?
$HTTP_SERVER_VARS['REMOTE_ADDR'] : ( ( !empty($HTTP_ENV_VARS['REMOTE_ADDR']) )
? $HTTP_ENV_VARS['REMOTE_ADDR'] : $REMOTE_ADDR );
$entries = explode(',', getenv('HTTP_X_FORWARDED_FOR'));
reset($entries);
while (list(, $entry) = each($entries))
{
$entry = trim($entry);
if ( preg_match("/^([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)/", $entry,
$ip_list) )
{
$private_ip = array('/^0\./', '/^127\.0\.0\.1/',
'/^192\.168\..*/', '/^172\.((1[6-9])|(2[0-9])|(3[0-1]))\..*/', '/^10\..*/',
'/^224\..*/', '/^240\..*/');
$found_ip = preg_replace($private_ip, $client_ip,
$ip_list[1]);
if ($client_ip != $found_ip)
{
$client_ip = $found_ip;
break;
}
}
}
}
else
{
$client_ip = ( !empty($HTTP_SERVER_VARS['REMOTE_ADDR']) ) ?
$HTTP_SERVER_VARS['REMOTE_ADDR'] : ( ( !empty($HTTP_ENV_VARS['REMOTE_ADDR']) )
? $HTTP_ENV_VARS['REMOTE_ADDR'] : $REMOTE_ADDR );
}
$user_ip = encode_ip($client_ip);
Replace the above code with:
//
// Obtain and encode users IP
//
$client_ip = ( !empty($HTTP_SERVER_VARS['REMOTE_ADDR']) ) ?
$HTTP_SERVER_VARS['REMOTE_ADDR'] : ( ( !empty($HTTP_ENV_VARS['REMOTE_ADDR']) )
? $HTTP_ENV_VARS['REMOTE_ADDR'] : $REMOTE_ADDR );
$user_ip = encode_ip($client_ip);
This will remove the code that tries to obtain the posters IP via
X-Forwarded-For.
------------------------------------------------
Credit
Discovery of this issue is credited to Wang & the SRR project group of Ready
Response <srr@xxxxxxxxxxxxxxxxx>