- check out the stylin' NEW Collusion haxor gear at Jinx Hackwear!!! -
- sign up on the Collusion Syndicate's infotainment discussion lists!!! -

Volume 28
Oct 2001


 HOME

 TechKnow
 Media Hack
 Parallax
 Reviews
 Fiction
 Humor
 Events
 Offsite

 Mission
 Responses
 Discussion
 #Collusion
 NEW!

 Submit a Story
 Collusioneers
 © & TM Info
 Contact Us


SETI@Home

Join the
Collusion
SETI Team!




PHP-Nuke Still Flawed
 by corrupt

PHP-Nuke, a well known PHP-based portal system which is used by thousands of sites on the internet still cannot keep its security factor up.  They have done a lot of security fixes in the past, but a lot of sites are not up to date on all the updates, thus becoming targets for hackers who know PHP-Nuke's weak points.

Here is one of the security flaws, which can be done on some nuke sites:

admin.php?upload=1&file=config.php&file_name=test.txt&wd%20ir=&userfile=config.php&userfile_name=test.txt

This will basically clone the config.php file as a text file on the server.  If all goes well and everything is CHMODed correctly, you will be able to go to http://www.sitelocation.com/test.txt and view their config.php, which contains sensitive MySql information.  It will display their MySql login and password on most circumstances, which is 70% of the time their root login/pass.  I took advantage of this bug and took down a lot of sites.  Here are some examples of what will happen after you clone their config.php:

http://kauai.net/html/test.txt
http://www.pdltd.com/test.txt
http://csc.dhs.org/test.txt
http://www.spyndle.com/test.txt
http://www.camp4.com/test.txt

There is some I did a few minutes ago, just to show you how its done.  This is a very valuable method, but at what price?  Would the government call this loophole hacking?  The php nuke authors shouldn't have half assed their coding and allow this to happen.  They should be to blame, not us.

Here is another thing I found.  If you cannot get root onto the site, there are some things you can do.  If your at the upload screen after doing the method shown above, you can upload files usually.  On most servers, index.html will open before index.php, so for another effective method site defacement just upload index.html onto the server, and the web address will go to that instead of the one with a php extension.  This does tend to vary on some servers, but I have only seen one or two that it does on.

Enough.
--corrupt of Overdose