exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

dieselPHP.txt

dieselPHP.txt
Posted May 22, 2006
Authored by Matt Gibson

When an unsuspecting user installs Diesel PHP Job Site on their webserver, all information is emailed back to the original programmers of this software. This information is sent from install.php, which includes the database host, database name, username, and password used to connect.

tags | advisory, php
SHA-256 | 5d5b0dd0d3e52882f08f1ee23035cf6d6d17e1037ea7dd9e74b2ca1c2e0a0c95

dieselPHP.txt

Change Mirror Download
Subject: [Info Disclosure] Diesel PHP Job Site Latest Version

Severity: Pretty Bad
Title: Diesel PHP Job Site Latest Version Information Disclosure
Home Page: http://www.dieselscripts.com/
Product Page: http://www.dieselscripts.com/diesel-job-site.html
Date: May 17, 2006


Synopsis:
=========
When an unsuspecting user installs this software on their
webserver, all information is emailed back to the original
programmers of this software. This information is sent
from install.php, which includes the database host,
database name, username, and password used to connect.


Background:
===========
This script allows job seekers to post their resumes
and search job postings for free and employers pay
a fee to post jobs and search the resumes online.
Free posting and searching is also possible.


Information:
============
I run a VOIP Jobs site tailored to the Asterisk Community.
As I do not have much money or investors I couldn't afford
some swanky ass Job Board. I found this one, which was
relatively cheap, but required register_globals. I bought it
anyway (mistake #1). So, I thought I would be nice, and edit
their software to remove this requirement. While I was looking
through the code I found this little gem in the install file.

Details:
========
In install.php, line 31, there is a call to a mail function
that emails support@dieselscripts.com with your username,
email, database credentials, hosts and passwords. Due to their
licensing agreement I'm not actually allowed to post the offending
line of code from the file.

It's worth mentioning that they also tried to hide this from
unsuspecting users by tabbing it across the screen a number of
times so it was hidden if scrolling without wordwrap on. Sneaky bastards.

Fix/Workaround:
===============
1. Don't use this software
2. Use it, but first comment/delete that line from install.php
3. Disable the ability to send mail from PHP/Server
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close