0day.today - Biggest Exploit Database in the World.
![](/img/logo_green.jpg)
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earnGOLD
Administration of this site uses the official contacts. Beware of impostors!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
File Thingie v2.5.5 File Security Bypass
======================================== File Thingie v2.5.5 File Security Bypass ======================================== Title: File Thingie v2.5.5 File Security Bypass Author: Jeremiah Talamantes (RedTeam Security) Website: http://www.redteamsecure.com/labs Date: 5/15/2010 Application: File Thingie Version: 2.5.5 Link: http://www.solitude.dk/filethingie/download Description: There are security controls in place that attempt to prevent users from uploading PHP files and also renaming them to PHP extensions. However advanced security controls do not exist that would prevent a user from uploading a text file containing PHP code. An attacker can exploit a weakness in the file rename process allowing the attacker to rename a text file (containing code) to a .php extension and execute the script. This exploit demonstrates a way to backdoor File Thingie by uploading an *.inc file that contains a backdoored copy of File Thingie, then uploading a *.txt file containing some PHP code that will overwrite ft2.php to execute the backdoored copy of File Thingie. But first the *.txt file has to be renamed to a *.php and then executed in the browser. Test Environment: * Tested on WAMP Server 2.0 * WAMP running on Windows XP, SP2 (EN) ==================================================================== Download the following file for more instructions and exploits: ==================================================================== http://inj3ct0r.com/sploits/12254.zip # 0day.today [2024-07-01] #