[Full-disclosure] Re: Postnuke 0.750 - 0.760rc4 local file inclusion

From: Paul Laudanski (zx_at_castlecops.com)
Date: 05/16/05

  • Next message: Raymond Joyal: "[Full-disclosure] Javascript Bug in Firefox"
    Date: Mon, 16 May 2005 12:05:51 -0400 (EDT)
    To: pokley <pokleyzz@scan-associates.net>
    
    

    On Mon, 16 May 2005, pokley wrote:

    > Product : Postnuke 0.750 (http://www.postnuke.com)
    > Description: Postnuke 0.750 - 0.760rc4 local file inclusion
    > Severity: High
    >
    > Proof of concept
    > ================
    > http://server.com/index.php?module=Blocks&type=lang&func=../../../../../../etc/passwd%00
    >
    > Fix
    > ===
    > Fix Available from postnuke cvs since 5th May 2005
    >
    > http://cvs.postnuke.com/viewcvs.cgi/Historic_PostNuke_Library/postnuke-devel/html/includes/pnMod.php.diff?r1=1.47&r2=1.48

    Directory traversal in a PHP environment can be avoided in a few different
    ways:

    1) Proper programming practice,
    2) Usage of http://php.net/basename,
    3) Install modsecurity and prevent path traversal,
    4) Disable globals in php.ini.

    -- 
    Sincerely,
    Paul Laudanski .. Computer Cops, LLC.
    Microsoft MVP Windows-Security 2005
    CastleCops(SM)... http://castlecops.com
    CC Blog ......... http://blog.castlecops.com
    Staff Blogs ..... http://busterbunny.castlecops.com
    Our Vision ...... http://castlecops.com/postt63382.html
    http://cuddlesnkisses.com http://justalittlepoke.com http://zhen-xjell.com
    ________ Information from Computer Cops, L.L.C. ________
    This message was checked by NOD32 Antivirus System for Linux Mail Server.
      part000.txt - is OK
    http://castlecops.com
    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.grok.org.uk/full-disclosure-charter.html
    Hosted and sponsored by Secunia - http://secunia.com/
    

  • Next message: Raymond Joyal: "[Full-disclosure] Javascript Bug in Firefox"