ID: 28946
Updated by: [EMAIL PROTECTED]
Reported By: ripe at 7a69ezine dot org
Status: Bogus
Bug Type: Apache2 related
Operating System: Gentoo Linux
PHP Version: 4.3.6
New Comment:
Yes, but allowing users to specify files to be included is crazy.
Nobody should write code like that. Never mind the cross-site
scripting problem, people could simply specify /etc/passwd to be
included. It is up to the programmer to write code that doesn't do
stupid stuff like this.
Previous Comments:
------------------------------------------------------------------------
[2004-06-28 21:49:16] ripe at 7a69ezine dot org
Trying to include no-existing HELO.inc file apache returns
tome this HTML code:
<b>Warning</b>: main(HELO.inc): failed to open stream: No
such file or directory in
<b>/home/apuigsech/public_html/data/v.php</b> on line
<b>3</b><br />
�Who write this error code? I think that it's
written by mod_php, but i'm noyt sure at all cause i have
no readed php4 source code.
------------------------------------------------------------------------
[2004-06-28 21:38:03] [EMAIL PROTECTED]
Sorry, but your problem does not imply a bug in PHP itself. For a
list of more appropriate places to ask for help using PHP, please
visit http://www.php.net/support.php as this bug system is not the
appropriate forum for asking support questions.
Thank you for your interest in PHP.
It is up to the developer to handle such issues.
------------------------------------------------------------------------
[2004-06-28 12:03:29] ripe at 7a69ezine dot org
Description:
------------
There is a cross-site scripting on mod_php error's
page that allow to execute javascript stuff.
You can reproduce the error following this
step-by-step:
1/ create a page with this content.
<? include($_GET['inc'] ?>
2/ Try http://host/file.php?inc=<script>alert()</script>
3/ An alert() popup is opened.
It can allow, on a not-well coded websites, to
change an inofensive error (yes, I know that an include is
not inofensive but its only the example) to potential XSS
error that can allow a malicious user, using a litle
social engineering, to seize a cookie session or other
data.
Expected result:
----------------
------------------------------------------------------------------------
--
Edit this bug report at http://bugs.php.net/?id=28946&edit=1