[19167] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Fwd: Re: phpnuke, security problem...

daemon@ATHENA.MIT.EDU (Peter van Dijk)
Mon Feb 12 22:36:24 2001

Mail-Followup-To: BUGTRAQ@SECURITYFOCUS.COM
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Message-Id:  <20010212210410.F55386@dataloss.nl>
Date:         Mon, 12 Feb 2001 21:04:10 +0100
Reply-To: Peter van Dijk <peter@DATALOSS.NL>
From: Peter van Dijk <peter@DATALOSS.NL>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <200102121107.LAA28607@srvlis11.teleweb.pt>; from
              tharbad@KAOTIK.ORG on Mon, Feb 12, 2001 at 11:07:15AM -0000

On Mon, Feb 12, 2001 at 11:07:15AM -0000, Joao Gouveia wrote:
[snip]
> > > Example: http://www.phpnuke.org/opendir.php?requesturl=/etc/passwd

You can actually insert any URL instead of "/etc/passwd" and have it
read. Depending on the server's configuration, this could be abused to
execute PHP code, probably, and from that, any UNIX shell command.

The author obviously doesn't care about security.

Greetz, Peter.

home help back first fref pref prev next nref lref last post