lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1388598277.20070723185744@gmail.com>
Date: Mon, 23 Jul 2007 18:57:44 +0200
From: BlackHawk <hawkgotyou@...il.com>
To: bugtraq@...urityfocus.com
Subject: Re: PHMe CMS 0.0.2 local File Include Vulnerabilitiy

Hello h4ck3riran,

looks like you need mq=off to make this attack..
and this is quite impossible a tthe time because is defailt on..

Monday, July 23, 2007, 4:04:41 PM, you wrote:

> # Tilte:  PHMe CMS 0.0.2 local File Include Vulnerabilitiy

> # <www.Aria-security.Com For English >
> # <www.Aria-Security.net For Persian >
> # < Author: You_You >
> # < Software: PHMe CMS >
> # < Site Script: http://sourceforge.net/projects/phme >

>  


>  proof Of Concept : 
>  
>  www.example.com/[path]/resources/function_list.php?action=[Local Script]%00

-- 
Best regards,
 BlackHawk                            mailto:hawkgotyou@...il.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ