Here is a Fix from me, delete the pmpopup.php, create a new one with this in 
there:


<?



$m1 = str_replace("%20", " ", $_GET['m1']);

$m2 = str_replace("%20", " ", $_GET['m2']);

$m3 = str_replace("%20", " ", $_GET['m3']);

$m4 = str_replace("%20", " ", $_GET['m4']);

$u1 = $_GET['u1'];



foreach ($_POST AS $key => $val) {

    if (${$key} == $val) {

        unset (${$key});

    }

}

foreach ($_GET AS $key => $val) {

    if (${$key} == $val) {

     echo "Hacking Attempt logged \n";

        unset (${$key});

    }

}

foreach ($_COOKIE AS $key => $val) {

    if (${$key} == $val) {

        unset (${$key});

    }

}


$output = "<script language=\"javascript\" type=\"text/javascript\">

<!--

function jump_to_inbox()

{

        opener.document.location.href = \"$u1\";

        window.close();

}

//-->

</script>

<body>

  <table width=\"100%\" height=\"100%\" border=\"0\" cellspacing=\"0\" 
cellpadding=\"1\" bgcolor=\"#F5F5F5\">

    <tr>

      <td>

        <table align=\"center\" width=\"95%\"  border=\"1\" cellspacing=\"0\" 
cellpadding=\"0\">

          <tr>

            <td valign=\"top\" width=\"100%\" bgcolor=\"#DFE6EF\" 
align=\"center\"><br /><strong><font face=\"verdana\" size=\"2\">$m1<a href=$u1 
onclick=\"jump_to_inbox();return false;\" target=\"_new\"> 
$m2</a>$m3</font></strong><br /><br /><font face=\"verdana\" size=\"2\"><a 
href=\"javascript:window.close();\" >$m4</a></font><br /><br />

            </td>

          </tr>

        </table>

      </td>

    </tr>

  </table>

</body>

  

  ";


  print $output;


  ?>



MFG


Sourcecode


yet another Exploit Source : http://www.replica-solutions.de

[Perl] my start.pl from the Wapiti HTTP Vuln. Scanner -> 
http://tinyurl.com/ha6km

Nmap in combination with other Linux tools: http://tinyurl.com/pknlw

Reply via email to