exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

phorum5114local.txt

phorum5114local.txt
Posted Jul 28, 2006
Authored by C-W-M

Phorum version 5.1.14 is susceptible to cross site scripting and local file inclusion attacks.

tags | exploit, local, xss, file inclusion
SHA-256 | 9c72077583d824261da03a364967e6f7aac0f9330b3bbdb08b9bca4689408220

phorum5114local.txt

Change Mirror Download
Some vulnerabilities have been discovered in Phorum, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose sensitive information, and potentially compromise a vulnerable system. 


1) Input passed to the "template" parameter in pm.php isn't properly verified, before it is used to include files. This can be exploited to include arbitrary files from local resources.

Example:
http://[host]/pm.php?1,page=1&template=[file]%00



Another unspecified parameter is reportedly also affected.


Successful exploitation requires that "register_globals" is enabled and that "magic_quotes_gpc" is disabled.

This can further be exploited to include arbitrary PHP code injected into Apache web logs.

2) Input passed to the "mode" parameter in posting.php isn't properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

The vulnerabilities have been confirmed in version 5.1.14. Prior versions may also be affected.





Solution:
Update to version 5.1.15.
http://www.phorum.org/downloads.php

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close