[38647] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Vulnerability kali's tagboard

daemon@ATHENA.MIT.EDU (security curmudgeon)
Thu Apr 28 14:59:37 2005

Date: Thu, 28 Apr 2005 03:47:35 -0400 (EDT)
From: security curmudgeon <jericho@attrition.org>
To: piker piker <piker_666@hotmail.com>
Cc: bugtraq@securityfocus.com
In-Reply-To: <20050422020306.4876.qmail@www.securityfocus.com>
Message-ID: <Pine.LNX.4.61.0504280346300.25578@forced.attrition.org>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII


For reference, Kali's tagboard can be found at:
http://www.xentrik.net/php/tagboard.php

: There are some bugs in the kali's tagboard, you can access to the admin 
: system without password!, you can put iframes, scripts... But the most 
: vulnerabilitie is in the ban ip's, you can put this script: " <? 
: system($cmd) ?> " and execute commands in the server with this url: 
: Example: http://web.com/tag/admin/banned.php?&cmd=command.

From the readme.txt:

I suggest you password protect this directory with .htaccess, like so:

******************************************
* Example .htaccess File
******************************************
AuthUserFile /home/username/public_html/tagboard/admin/.htpasswd
AuthGroupFile /dev/null
AuthName "Tagboard Admin Area"
AuthType Basic

<Limit GET POST>
require valid-user
</Limit>
******************************************
To learn more about password protection with .htaccess, go to
http://www.xentrik.net/htaccess/password.php



home help back first fref pref prev next nref lref last post