lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200512140423.jBE4NUGt021000@cairo.mitre.org>
Date: Tue, 13 Dec 2005 23:23:30 -0500 (EST)
From: "Steven M. Christey" <coley@...re.org>
To: silversmith@...iyane.com
Cc: bugtraq@...urityfocus.com
Subject: Re: IMOEL CMS Sql password discovery



Hello,

>IMOEL CMS has the weakness to download the plain text sql password in
>the setting.php file
>
>*/*************************************
>$setting['host']['username'] = 'sqlusername';
>$setting['host']['password'] = 'sqlpassword';
>
>***************************************
>so u can download the setting.php file & view the plain text password

These commands appear within a "<?php >" construct, so on a properly
configuredeb server, I would think that the code would be executed due
to the ".php' extension.  So there would not be any leak to a remote
attacker unless the attacker used some other vulnerability to obtain
the file.

Or is this a concern for multiple users on the same server?  (I don't
know PHP that well so apologies if this is a dumb question.)

- Steve


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ