[VIM] false: paNews 2.0b4 < = RFi Vulnerabilities
    str0ke 
    str0ke at milw0rm.com
       
    Tue Feb 13 10:25:26 EST 2007
    
    
  
Below is the code.
$base_dir = "";
$base_url = "";
if (!$IS_PANEWS) {
$IS_PANEWS = 1;
include_once($base_dir . "config.php");
include_once($base_dir . "includes/database.php");
include_once($base_dir . "includes/functions.php");
$mysql->connect();
extract($_GET);
###############################3
There are a few extract calls in multiple of the scripts that are used
but the current one shouldn't be vulnerable.
phpinfo disclosure placed in the code.  Got to love it.
if ($action == "login") {
	$done = $auth->login();
	} else if ($action == "logoff") {
	$auth->logoff();
	} else if (md5($action) == "8e31d9de70421ac6d33b50887b523a5b") {
	// This is for the phparena staff. It is simply for debugging purposes.
	// If you do not like the idea of this being here... Simply remove:
	// 8e31d9de70421ac6d33b50887b523a5b from above.
	phpinfo();
	exit;
	}
/str0ke
##################################################################
#paNews 2.0b4 < = RFi Vulnerabilities
#
#Download : http://phparena.net/files/officialdloads/panews/panews_20b4.zip
#
#Script Name : paNews
#V.Code in : [path]/viewnews.php
#
#
#          include_once($base_dir . "config.php");
#          include_once($base_dir . "includes/database.php");
#          include_once($base_dir . "includes/functions.php");
#Exploit : www.target.com/path/viewnews.php?base_dir=[shell]
    
    
More information about the VIM
mailing list