[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20070502230838.396.qmail@securityfocus.com>
Date: 2 May 2007 23:08:38 -0000
From: DoZ@...kersCenter.com
To: bugtraq@...urityfocus.com
Subject: Aardvark Topsites PHP Directory Disclosure Vulnerability
Aardvark Topsites PHP Directory Disclosure Vulnerability
Aardvark Topsites PHP is the premier free PHP/MySQL topsites script. An attacker can see what files are in the Directory. Knowing what is there to be executed can allow for more targeted and intelligent attacks against PHP Files known to be vulnerable listed there. A successful attack could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.
Hackers Center Security Group (http://www.hackerscenter.com)
Credit: Doz
Remote: YES
Class: Improper Instalation configuration.
Vendor: http://www.aardvarktopsitesphp.com
Version: 5.1.2 and Previous versions!
* Attackers can exploit these issues via a web client.
Exploit:
http://www.site.com/topsites/sources/
http://www.site.com/sources/
Proff of Concept: http://i17.tinypic.com/646pvtg.jpg
Security researcher? Join us: mail Zinho at zinho at hackerscenter.com
Powered by blists - more mailing lists