[21305] in bugtraq

home help back first fref pref prev next nref lref last post

Re: phpMyAdmin 2.1.0 + world readable (apache) log files enable remote user to run

daemon@ATHENA.MIT.EDU (Shaun Clowes)
Mon Jul 2 16:04:21 2001

Message-ID: <007601c102e0$0c6ca0a0$1400a8c0@copperfield>
From: "Shaun Clowes" <shaun@securereality.com.au>
To: <bugtraq@securityfocus.com>
Date: Mon, 2 Jul 2001 20:16:24 +1000
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit


> arbitrary PHP Codes as apache user.
> From: <sl4sh@ifrance.com>
> MIME-Version: 1.0
> Content-Type: text/plain; charset="iso-8859-1"
> Content-Transfer-Encoding: quoted-printable
> Date: Sun, 1 Jul 2001 23:43:17 GMT
> Message-id: <200107012343.115e@lh00.opsion.fr>
>
> Note : sorry for my pity english.

Just to be clear this vulnerability is the one we reported in pre advisory
form in April (http://www.securereality.com.au/srpre00001.html) and
presented in detail at the Black Hat Briefings in Asia. All users that
applied our patch are not vulnerable to this problem. We'll be releasing a
detailed advisory describing this hole and a paper on exploiting PHP scripts
very soon.

Thanks,
Shaun
SecureReality Pty Ltd


home help back first fref pref prev next nref lref last post