BugTraq
Re: xxs in MKPortal M1.1 Sep 28 2006 08:34PM
security replica-solutions de
Here is a Fix from me, delete the pmpopup.php, create a new one with this in there:

<?

$m1 = str_replace("%20", " ", $_GET['m1']);

$m2 = str_replace("%20", " ", $_GET['m2']);

$m3 = str_replace("%20", " ", $_GET['m3']);

$m4 = str_replace("%20", " ", $_GET['m4']);

$u1 = $_GET['u1'];

foreach ($_POST AS $key => $val) {

if (${$key} == $val) {

unset (${$key});

}

}

foreach ($_GET AS $key => $val) {

if (${$key} == $val) {

echo "Hacking Attempt logged \n";

unset (${$key});

}

}

foreach ($_COOKIE AS $key => $val) {

if (${$key} == $val) {

unset (${$key});

}

}

$output = "<script language=\"javascript\" type=\"text/javascript\">

<!--

function jump_to_inbox()

{

opener.document.location.href = \"$u1\";

window.close();

}

//-->

</script>

<body>

<table width=\"100%\" height=\"100%\" border=\"0\" cellspacing=\"0\" cellpadding=\"1\" bgcolor=\"#F5F5F5\">

<tr>

<td>

<table align=\"center\" width=\"95%\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\">

<tr>

<td valign=\"top\" width=\"100%\" bgcolor=\"#DFE6EF\" align=\"center\"><br /><strong><font face=\"verdana\" size=\"2\">$m1<a href=$u1 onclick=\"jump_to_inbox();return false;\" target=\"_new\"> $m2</a>$m3</font></strong><br /><br /><font face=\"verdana\" size=\"2\"><a href=\"javascript:window.close();\" >$m4</a></font><br /><br />

</td>

</tr>

</table>

</td>

</tr>

</table>

</body>

";

print $output;

?>

MFG

Sourcecode

yet another Exploit Source : http://www.replica-solutions.de

[Perl] my start.pl from the Wapiti HTTP Vuln. Scanner -> http://tinyurl.com/ha6km

Nmap in combination with other Linux tools: http://tinyurl.com/pknlw

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus