lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <985b1a3d0911120922l6f4da046rcd35ba74dd900646@mail.gmail.com> Date: Thu, 12 Nov 2009 18:22:39 +0100 From: Vincent Guasconi <tyoptyop@...il.com> To: Milan Berger <m.berger@...ject-mindstorm.net> Cc: full-disclosure@...ts.grok.org.uk Subject: Re: WordPress <= 2.8.5 Unrestricted File Upload Arbitrary PHP Code Execution On Thu, Nov 12, 2009 at 1:48 PM, Milan Berger <m.berger@...ject-mindstorm.net> wrote: >> and it should be possible to request the uploaded file via a link: >> http://link-to-our-wp-unsecured-blog.com/wp-content/uploads/2009/11/test-vuln.php.jpg > > tried this with lighttpd and wordpress 2.8.5 and PHP 5.2.11-pl0-gentoo > with Suhosin-Patch 0.9.7 > Shows a broken image no code executed. http://httpd.apache.org/docs/1.3/mod/mod_mime.html#multipleext -- Guasconi Vincent _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists