|
/************************************ **---------------------------------** ** RusH security team advisory ** **---------------------------------** ** www.rsteam.ru ** ** http://rst.void.ru ** ************************************/ /***********************************/ Product: PHP-Coolfile Version: 1.4 Vuln: unauthorized access OffSite: http://dcom.bip.ru/coolfile/ /***********************************/ Date: 11/11/2003 Author: 1dt.w0lf // RsT /***********************************/ Problem: ======== Bug found in action.php file (string 96): [scip] if (@$action == "edit") { edit_file($file, $basename, @$filename); } if (@$action == "copy") { [scip] } if (@$action == "print_chmod") { [scip] } elseif ((@md5($uin) != session_id()) | (!@$uin)) { print "Access denied!"; } # 96 string [scip] last string (96) don't work if $action="copy" or any other... Overview: ========= Any can view config.php file and get administration login and password Example: www.site.com/php-coolfile/action.php?action=edit&file=config.php Solution: ========= 1. Delete 96 string. 2. copy this code in 23 string of action.php file if ((@md5($uin) != session_id()) OR (!@$uin)) { print "Access denied!"; exit; } /***********************************/ U can view RU version of this text on our site http://www.rsteam.ru /***********************************/ Contacts: 1dt.w0lf - idtwolf@pisem.net RusH team - r00t@rsteam.ru /***********************************/