 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 62
Members: 0
Total: 62
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
php shell -> root |
 |
Posted: Wed Jun 13, 2007 8:11 pm |
|
|
drag |
Active user |

 |
|
Joined: May 31, 2007 |
Posts: 25 |
|
|
|
 |
 |
 |
|
Is it possible to run local exploits within the r57 or c99 shell to escalate priveleges? Or do you need to be using an actual shell on the system? |
|
|
|
|
 |
Re: php shell -> root |
 |
Posted: Fri Jun 15, 2007 9:47 am |
|
|
ToXiC |
Moderator |

 |
|
Joined: Dec 01, 2004 |
Posts: 181 |
Location: Cyprus |
|
|
 |
 |
 |
|
drag wrote: | Is it possible to run local exploits within the r57 or c99 shell to escalate priveleges? Or do you need to be using an actual shell on the system? |
with php shells you have limited access to work only on tmp folders or on folders/files that are public.
To move futher on you need a binder (if you are able to install one) .. So to successfully compromise a system with c99 or r57 the system itself should be really stupitly configured.
but still .. maybe the system is patched and configured correctly .. but users that are on it leave the configuration.php or config.php or admin.php files on 777 r/w/e permition so everybody is able to read them ..
and if you move one step futher.. you can do something like this..
cat /etc/passwd
you got all the users on the site .. then write a small script that the only thing will do is.
cat /home/user1/configuration.php >> out.txt
cat /home/user2/configuration.php >> out.txt
cat /home/user3/configuration.php >> out.txt
cat /home/user1/config.php >> out.txt
cat /home/user2/config.php >> out.txt
cat /home/user3/config.php >> out.txt
(imagine having a server with more thatn 1000 sites on it.. NOT ALL THE USERS REMOVE 777 permition on those files)
after that download out.txt file and see what inside
most probably a lot configuration files and a lot database names user/pass
.... then with c99 you can connect to the database and edit/or view the hash value of the admin..
.......( Then of course you call the owner of the site and you inform him to change the permitions )
Now ... With statistical results.. 3 out of 10 users use same password to cpanel/ssh/admin section of their web application (joomla/phpnuke/e107/etc etc)
Then is more likely to have an ssh password and if you want you can compromise the whole system easier with local exploits...
This is just a thought.. Its easier to exploit a users stupidity than a server's bug
ToXiC |
|
_________________ who|grep -i blonde|talk; cd~;wine;talk;touch;unzip;touch; strip;gasp;finger;gasp;mount; fsck; more; yes; gasp; umount; make clean; sleep;wakeup;goto http://www.md5this.com |
|
|
|
 |
 |
|
 |
Posted: Sat Jun 16, 2007 9:04 am |
|
|
pexli |
Valuable expert |

 |
|
Joined: May 24, 2007 |
Posts: 665 |
Location: Bulgaria |
|
|
 |
 |
 |
|
ToXiC no need 777 perms on files to read him,604 enough to read this files witn owner nobody. |
|
|
|
|
Posted: Sat Jun 16, 2007 12:55 pm |
|
|
ToXiC |
Moderator |

 |
|
Joined: Dec 01, 2004 |
Posts: 181 |
Location: Cyprus |
|
|
 |
 |
 |
|
koko wrote: | ToXiC no need 777 perms on files to read him,604 enough to read this files witn owner nobody. |
yes i was giving just an example.. |
|
_________________ who|grep -i blonde|talk; cd~;wine;talk;touch;unzip;touch; strip;gasp;finger;gasp;mount; fsck; more; yes; gasp; umount; make clean; sleep;wakeup;goto http://www.md5this.com |
|
|
|
www.waraxe.us Forum Index -> Remote file inclusion
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|