mailing list archives
Re: VERY HIGH VULNERABILITY DISCLOSURE !!! MASS ROOT POSSIBLE !!! PLEASE BE ATTENTIVE !!!
From: <m.esco () wp pl>
Date: Sat, 3 Jul 2004 10:19:19 +0200
Is this cool or not, I can't tell.:P
include($page); // <--- fucking lame
So, you don't know, but there is a BIGBUG.
No, it is a f*****g lame programmer bug :)
You can include a remote page, that contains
php code, that will be executed on the fuck-teso server:
On most of php servers configuration directive allow_url_fopen
(http://php.net/manual/en/ref.filesystem.php#ini.allow-url-fopen) is set to
off, so you cannot parse remote script to that server. Sometimes it is not,
and there is some possibility of doing the above, of course, only when some
coder have not done his job properly.
Solution to "the problem":
Use your brain while coding, and test your code.
Quick and usefull solution:
include(preg_replace("|[^\w\.]|", "", $page));
Full-Disclosure - We believe in it.