lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 3 Dec 2012 18:44:24 -0500
From: Jeffrey Walton <noloader@...il.com>
To: auto59190641@...hmail.com
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: EasyPHP 12.1 - Remote code execution of any
 php/js on local PC

> "Yes, we have responsibility, but no enough time to make a new release. ...
> This failure will never used by real hackers because it's better to found
> something in Acrobat or other wildspread soft. ... So stop crying, kiddy."
>
> Conclusion: Better think twice before using a software from developers like
> this. There are alternatives to EasyPHP.
That sounds like a Pwnie Award nomination for the lamest vendor
response. http://pwnies.com.

Jeff

On Sat, Dec 1, 2012 at 5:51 AM,  <auto59190641@...hmail.com> wrote:
> Follow-Up to http://seclists.org/fulldisclosure/2012/Nov/7
>
>> EasyPHP 12.1 - Remote code execution of any php/js on local PC
>>
>> Product:
>>
>> EasyPHP installs a complete WAMP environment for PHP developers in
>> Windows including PHP, Apache, MySQL, PhpMyAdmin, Xdebug... -
>> http://www.easyphp.org/
>>
>> Problem:
>>
>> EasyPHP also provides a php "Code Tester" feature: "If you want to
>> quickly test a piece of code, enter your code in the field below and
>> click on "Interpret the code"."
>>
>> codetester.php gets the php via a form which submits it to hardcoded
>> url http://127.0.0.1/home/codetester.php
>>
>> There is no nonce or any other check about the origin of the post
>> call.
>>
>> The php will then be written to a file /home/codesource.php and
>> executed.
>>
>> If EasyPHP 12.1 is running on your PC and you visit an "evil" page on
>> some server in internet with your browser, you are pwned.
>> [...]
>
> Finally (sort of) an answer of the developers:
>
> "Yes, we have responsibility, but no enough time to make a new release. ...
> This failure will never used by real hackers because it's better to found
> something in Acrobat or other wildspread soft. ... So stop crying, kiddy."
>
> Conclusion: Better think twice before using a software from developers like
> this. There are alternatives to EasyPHP.
>
> And a hint to interested fellow researchers, there is much more "failure" in
> EasyPHP, but we "stop crying", for now...

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ