Achim,

On Mon, Dec 29, 2008 at 5:03 AM, Achim Hoffmann <a...@securenet.de> wrote:
>
> !! a web application, the vulnerability was the classic
> !! index.php?filename=/etc/passwd that let's you read the content of any
>
> !! attack.localFileReader: basically you only have one command, "cat",
> !! which allows you to print the content of a file using a local file
>
> Andres,
> unless I missed something in your description, you found a local file
> include vulnerabilitiy (which may be just a information leakage also,
> but that doesn't matter here:)

It's actually a local file READ vulnerability. The code looks like this:

<? file_get_contents( $_GET['filename'] ?>

Not like this:

<? require_once( $_GET['filename'] ?>

> and then you use "cat" which requires
> a command injection vulnerability.
> Could you please explain how that works?

I said "cat", not cat ;)
What I can do is read files, which is "by definition" what can be done
with the vulnerability.

> !!     Can you think about other interesting techniques that can be
> !! applied to this vulnerability in order to gain more information about
> !! the target server? Thanks for your input!
>
>  index.cgi?filename=../../../../../../../../proc/self/cmdline
>
> this works always if the vulnerability is there (missing data validation)
> and the web server is not jailed.
> It also works on some common *nix (all Linux, some Solaris, ...) and
> gives your all interesting data where to search further.

Nice trick! I'll add it! Thanks!

> {-: Achim



-- 
Andres Riancho
http://w3af.sourceforge.net/
Web Application Attack and Audit Framework

------------------------------------------------------------------------------
_______________________________________________
W3af-develop mailing list
W3af-develop@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-develop

Reply via email to