[VIM] Bogus - [c_r_ck at hotmail.com: Lazarus Guestbook (admin.php)Remote File Include Expliot]

dm at securityfocus.com dm at securityfocus.com
Wed Mar 7 18:02:04 EST 2007


One of our analysts looked at this and determined that it was bogus,
here was their notes:

$include_path = dirname(__FILE__);
require_once $include_path.'/admin/config.inc.php';
require_once $include_path.'/lib/mysql.class.php';
require_once $include_path.'/lib/image.class.php';
require_once $include_path.'/lib/template.class.php';
require_once $include_path.'/lib/session.class.php';
require_once $include_path.'/lib/admin.class.php';

the vulnerable parameter 'include_path' is defined.

Not vuln


----- Forwarded message from c_r_ck at hotmail.com -----

From: c_r_ck at hotmail.com
Subject: Lazarus Guestbook (admin.php)Remote File Include Expliot
To: bugtraq at securityfocus.com
Date: 7 Mar 2007 23:23:05 -0000
X-Mailer: MIME-tools 5.411 (Entity 5.404)
Message-ID: <20070307232305.1765.qmail at securityfocus.com>

# Lazarus Guestbook (admin.php)Remote File Include Expliot
# D.Script: http://www.carbonize.co.uk
# Dork: "Powered by Lazarus Guestbook from carbonize.co.uk"
# Discovered by Crack_man
# Homepage: http://www.b0rizq.biz
# Greetz To :B0rizq & red_casper & Draknaz kaiba & broken_proxy and all freind

# Exploit:
# [VicTim]/[path]/admin.php?include_path=shell.txt?cmd  

===========================

----- End forwarded message -----

-- 
Dave McKinney
Symantec

keyID: BF919DD7
key fingerprint = 494D 6B7D 4611 7A7A 5DBB  3B29 4D89 3A70 BF91 9DD7



More information about the VIM mailing list