Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 6 Oct 2001 18:30:13 -0700
From:      Kameron Gasso <kgasso@blort.org>
To:        "Karl M. Joch" <k.joch@kmjeuro.com>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: [Somewhat OT] PHPNuke exploit
Message-ID:  <20011006183012.A64097@blort.org>
In-Reply-To: <02da01c14ecd$4610e8a0$0a05a8c0@ooe.kmjeuro.com>; from k.joch@kmjeuro.com on Sun, Oct 07, 2001 at 03:13:22AM %2B0200
References:  <02da01c14ecd$4610e8a0$0a05a8c0@ooe.kmjeuro.com>

next in thread | previous in thread | raw e-mail | index | archive | help
* At 18:10PDT on 10/06/2001, Karl M. Joch <k.joch@kmjeuro.com> wrote:
> For all running PHPNuke. There is a exploit in admin.php which allows
> copying/uploading files. there are 2 articles on www.freebsd.at.

I know, this is a bit offtopic for the list, but...

IIRC wasn't the vulnerability part of the file upload functionality in PHP-Nuke?  I disabled this (through force, before all the nice patches were available ;) quite a while back on one of my sites, and haven't been able to successfully exploit myself.

The problem is, this didn't get a lot of attention - especially considering how many sites actually do run PHP-Nuke.  There's quite a bit of info, including patches at:

http://www.phpnuke.org/article.php?sid=2662&mode=thread&order=0&thold=0

If there are any unpatched nukers amongst us, I suggest you go grab the available patches secure your site _now_ before some script kiddie defaces your page to impress his "friends", or worse, uses his newly gained local access to your machine to gain root.

Cheers,

Kameron Gasso
kgasso@blort.org

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20011006183012.A64097>