[VIM] CVE dispute - phpAdsNew PHP file inclusion

Heinbockel, Bill heinbockel at mitre.org
Fri Dec 8 11:29:11 EST 2006


Researcher - CrackersChild (* he's back!! *)
BUGTRAQ:20061207 phpAdsNew-2.0.4-pr2 Remote File Inclusion Exploit
http://www.securityfocus.com/archive/1/archive/1/453773/100/0/threaded

Hidden in the supplied exploit script:

$req = HTTP::Request->new(GET
=>$Path.'admin/ib-maintenance.inc.php?phpAds_path='.$Pathtocmd.'?&'.$cm
d
v.'='.$cmd)or die "\nCould Not connect\n";

In the referenced product download, phpAdsNew-2.0.4-pr2
there is no file named "ib-maintenance.inc.php", however
there is a file "admin/lib-maintenance.inc.php". Okay, a
typo...

However, the first lines of admin/lib-maintenance.inc.php reads:

> @include (phpAds_path.'/language/english/maintenance.lang.php');
> if ($phpAds_config['language'] != 'english' &&
file_exists(phpAds_path.'/language/'.$phpAds_config['language'].'/maint
enance.lang.php'))
>     @include
(phpAds_path.'/language/'.$phpAds_config['language'].'/maintenance.lang
.php');

So, phpAds_path is a constant and can't be set via a GET parameter.


William Heinbockel
Infosec Engineer
The MITRE Corporation
202 Burlington Rd. MS S145
Bedford, MA 01730
heinbockel at mitre.org
781-271-2615


More information about the VIM mailing list