TUCoPS :: Web :: PHP :: bt1435.txt

PHP XSS exploit in phpinfo()



----- Original Message -----
From: "silent needle" <silentneedle@hotmail.com>
To: <bugtraq@securityfocus.com>
Sent: Tuesday, June 03, 2003 5:30 AM
Subject: PHP XSS exploit in phpinfo()


>
>
> PHP XSS exploit in phpinfo() by Silent Needle
>
> A: BACKGROUND(from php.net)
> int phpinfo ( [int what])
> Outputs a large amount of information about the current state of PHP. This
> includes information about PHP compilation options and extensions, the PHP
> version, server information and environment (if compiled as a module), the
> PHP environment, OS version information, paths, master and local values of
> configuration options, HTTP headers, and the PHP License.
>
> Because every system is setup differently, phpinfo() is commonly used to
> check configuration settings and for available predefined variables on a
> given system. Also, phpinfo() is a valuable debugging tool as it contains
> all EGPCS (Environment, GET, POST, Cookie, Server) data.
> The output may be customized by passing one or more of the following
> constants bitwise values summed together in the optional what parameter.
> One can also combine the respective constants or bitwise values together
> with the or operator.
>
> B: DESCRIPTION
> The cross site scripting allow you to print a html or javascript or others
> in the webpage
> when it just open not write in the page.
>
> C: EXPLOIT
> If you found a page running phpinfo(); like this
> http://[site]/info.php
> you can make a xss by adding any variable and put a html or javascript
> value for it like this
> THE EXPLOIT URL:
> http://[site]/info.php?variable=[SCRIPT]
> and you can change [SCRIPT] with any html or javascript code
> note:
> you can steal cookies by this way only if it was in the same folder with
> any prog using cookies.
>
> D: GREETZ
> To : SP.IC , DR^^FUNNY , ARAB-HAK , ZALABOZA , OH SHE IS A LITTLE RUN
> AWAY :)
>
> E:CONTACT
> Silent Needle
> silentneedle@hotmail.com
>
> F:OH LONG NIGHT
> Bye
>

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH