Date: Sat, 6 Oct 2001 18:30:13 -0700 From: Kameron Gasso <kgasso@blort.org> To: "Karl M. Joch" <k.joch@kmjeuro.com> Cc: freebsd-security@FreeBSD.ORG Subject: Re: [Somewhat OT] PHPNuke exploit Message-ID: <20011006183012.A64097@blort.org> In-Reply-To: <02da01c14ecd$4610e8a0$0a05a8c0@ooe.kmjeuro.com>; from k.joch@kmjeuro.com on Sun, Oct 07, 2001 at 03:13:22AM %2B0200 References: <02da01c14ecd$4610e8a0$0a05a8c0@ooe.kmjeuro.com>
next in thread | previous in thread | raw e-mail | index | archive | help
* At 18:10PDT on 10/06/2001, Karl M. Joch <k.joch@kmjeuro.com> wrote: > For all running PHPNuke. There is a exploit in admin.php which allows > copying/uploading files. there are 2 articles on www.freebsd.at. I know, this is a bit offtopic for the list, but... IIRC wasn't the vulnerability part of the file upload functionality in PHP-Nuke? I disabled this (through force, before all the nice patches were available ;) quite a while back on one of my sites, and haven't been able to successfully exploit myself. The problem is, this didn't get a lot of attention - especially considering how many sites actually do run PHP-Nuke. There's quite a bit of info, including patches at: http://www.phpnuke.org/article.php?sid=2662&mode=thread&order=0&thold=0 If there are any unpatched nukers amongst us, I suggest you go grab the available patches secure your site _now_ before some script kiddie defaces your page to impress his "friends", or worse, uses his newly gained local access to your machine to gain root. Cheers, Kameron Gasso kgasso@blort.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20011006183012.A64097>