lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20080229091058.13412.qmail@securityfocus.com>
Date: 29 Feb 2008 09:10:58 -0000
From: security@...or.net
To: bugtraq@...urityfocus.com
Subject: PHPMyTourney Remote file include Vulnerability

Hello

PHPMyTourney Remote file include Vulnerability

Discovered By : HACKERS PAL
Copy rights : HACKERS PAL
Website : http://www.soqor.net
Email Address : security@...or.net

home page : http://phpmytourney.sourceforge.net

Script : PHPMyTourney


vulnerable file : phpmytourney/sources/tourney/index.php

code
         $page = $_GET['page'];
         if(isset($page))
            include($page . '.php');
         else
            echo("must specify a page ");
lines 45-49

fast solution
replace with

if(file_exists($page . '.php') and !eregi(".",$page) and !eregi(":",$page) and !eregi("/",$page))
{
            include($page . '.php');
}
else
{
            echo("must specify a page ");
}

phpmytourney/sources/tourney/index.php?page=[Evil-Script]



#WwW.SoQoR.NeT

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ