mailing list archives
VERY HIGH VULNERABILITY DISCLOSURE !!! MASS ROOT POSSIBLE !!! PLEASE BE ATTENTIVE !!!
From: "Frog M () n" <frogman () bonbon net>
Date: Sat, 3 Jul 2004 06:40:55 +0200
This is IHCTEAM material. We fuck blackhats and we own the planet.
This is a leet advisory, s0 l33t. Just read it and be quiet.
IHC TEAM private work, all the fame become to IHC TEAM and the leetest mr. Frog-m () n !!!!
Security level: Very high baby !!!
What's the fuck about:
There is a BIGBUG in all php versions, in the include() function.
If this function is badly used, a roxor hax0r (like us) can compromise
a box remotely. He can execute commands with apache rights.
include($page); // <--- fucking lame
So, you don't know, but there is a BIGBUG. You can include a remote page, that contains
php code, that will be executed on the fuck-teso server:
It will give you this result:
suckit.tar.gz do_brk.c adore.tar.gz hello_world.c
So, do you understand what I mean ?
What contains we-own-teso.txt ?
Don't use the include() function, it is coded by idiots, like THEO () openbsd
This is so stupid, that we think that this function is maybe a backdoor
from THC.org, the uberh4x0r team very very very leet, that code fucking lame
Hey guys, you can be hax0red with google, so don't reference your site on google.
We owned everything and everywhere with this exploit:
Is was very funny to read .mil files.
WE ARE LOOKING FOR A JOB IN THE SECURITY RESEARCH
PLEASE CONTACT US RIGHT NOW :
karl () ihcteam org
capashen () espionet net
frog-man () phpsecure org
We n33d f4me, m0n3y, g1rls and m0nk3ys, so VIVA EL DISCLOSURO.
$$$ €€€ £££ <--- this is security corps' spirit :)
Full-Disclosure - We believe in it.