[VIM] Bogus - [c_r_ck at hotmail.com: Lazarus Guestbook (admin.php)Remote File Include Expliot]
dm at securityfocus.com
dm at securityfocus.com
Wed Mar 7 18:02:04 EST 2007
One of our analysts looked at this and determined that it was bogus,
here was their notes:
$include_path = dirname(__FILE__);
require_once $include_path.'/admin/config.inc.php';
require_once $include_path.'/lib/mysql.class.php';
require_once $include_path.'/lib/image.class.php';
require_once $include_path.'/lib/template.class.php';
require_once $include_path.'/lib/session.class.php';
require_once $include_path.'/lib/admin.class.php';
the vulnerable parameter 'include_path' is defined.
Not vuln
----- Forwarded message from c_r_ck at hotmail.com -----
From: c_r_ck at hotmail.com
Subject: Lazarus Guestbook (admin.php)Remote File Include Expliot
To: bugtraq at securityfocus.com
Date: 7 Mar 2007 23:23:05 -0000
X-Mailer: MIME-tools 5.411 (Entity 5.404)
Message-ID: <20070307232305.1765.qmail at securityfocus.com>
# Lazarus Guestbook (admin.php)Remote File Include Expliot
# D.Script: http://www.carbonize.co.uk
# Dork: "Powered by Lazarus Guestbook from carbonize.co.uk"
# Discovered by Crack_man
# Homepage: http://www.b0rizq.biz
# Greetz To :B0rizq & red_casper & Draknaz kaiba & broken_proxy and all freind
# Exploit:
# [VicTim]/[path]/admin.php?include_path=shell.txt?cmd
===========================
----- End forwarded message -----
--
Dave McKinney
Symantec
keyID: BF919DD7
key fingerprint = 494D 6B7D 4611 7A7A 5DBB 3B29 4D89 3A70 BF91 9DD7
More information about the VIM
mailing list