Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!

TUCoPS :: Web :: PHP :: basili~1.htm

Basilix Webmail System - read any file, run PHP programs

    Basilix Webmail System


    Basilix Webmail System 1.0.2beta, 1.0.3beta


    Karol W. found  following.  basilix  lunches a file  which name is
    read from an array request_id.  From basilix.php3 :

        $file = $request_id["$RequestID"];
        if($file == "") exit();
        include($BSX_FILESDIR . "/" . $file);

    So we could  change it very  easy, but in  file which  is
    added earlier  in basilix.php3  there is  a function  which checks
    the  RequestID   variable  so   we  can   not  pass   for  example
    request_id[BLAH]=/etc/passwd.  But there is one hole in it and  we
    can pass request_id[DUMMY]=whatever_we_want and it will not  fail.
    In effect  attacker can  read any  file in  system (if  she/he has
    permission) and can 'execute' php files.

    Example Exploit:[DUMMY]=../../../../etc/passwd&RequestID=DUMMY&username=blah&password=blah


    Remove DUMMY  from   It disallow  to pass  file names to
    include  in  request_id[DUMMY].   The  author  already knows about
    this bug and he prepared a quick fix on

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2015 AOH