Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email hr@neohapsis.com
From: scrap (webmaster_at_securiteinfo.com)
Date: Tue Oct 01 2002 - 16:18:28 CDT

  • Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]

    CoolForum v 0.5 beta shows content of PHP files
    The original document can be found at

    .oO Overview Oo.
    CoolForum v 0.5 beta shows PHP content files
    Discovered on 2002, September, 16th
    Vendor: http://www.coolforum.net

    CoolForum v 0.5 is a PHP forum. This forum can show content of PHP files.

    .oO Details Oo.
    This forum contains a file named "avatar.php". This file can show an image
    stored in the "logos" directory. Here is the source file of avatar.php :

    <? header('Pragma: no-cache');
    if (ereg(".jpg",$img))
       header("Content-Type: image/jpeg");
    else if (ereg(".gif",$img))
       header("Content-Type: image/gif");
    header('Expires: 0');




    What this file do ? It's simple : It takes the name of the file as argument,
    read it fully, and send back the content to your browser.
    The security flaw is that *any* file, in or *out* the logos directory can be
    show, bypassing *any* protected directories...

    .oO Exploit Oo.
    The exploit is really easy. The aim is to read the "connect.php" file in the
    "secret" directory. "connect.php" contains the informations about the
    database connection and "secret" directory is protected by a .htaccess file.
    You can do the exploit with any browser by using this syntax :
    Of course, replace <Forum_URL> by the vulnerable server.
    You will get a blank page. If you edit the source of this web page, you'll
    get the jackpot...

    .oO Solution Oo.
    The vendor has been informed and has solved the problem.
    Download CoolForum 0.5.1 or lastest at :

    .oO Discovered by Oo.
    Arnaud Jacques aka scrap