Jump to content

Recommended Posts

Full path disclosure

http://www.haggistech.co.uk/index.php?action=show&id=33[]

 

You can enter html in comments (Shows in the preview), but the comment does not show and the count stays at 0.

 

 

yeah the comments are moderated

 

working on the path disclosure and not having html :)

 

cheers guys

Link to comment
https://forums.phpfreaks.com/topic/103853-test-my-site/#findComment-534172
Share on other sites

Full Path Disclosure:

http://www.haggistech.co.uk/show.php

Warning: mysql_fetch_array(): supplied argument is not a valid MySQL result resource in /home/haggiste/public_html/show.php on line 15

 

You can enter blank comments.

 

 

also working on this lol

 

cheers for all who tested comments

Link to comment
https://forums.phpfreaks.com/topic/103853-test-my-site/#findComment-534173
Share on other sites

  • 1 month later...

Vulnerability description

HTTP TRACE method is enabled on this web server. In the presence of other cross-domain vulnerabilities in web browsers, sensitive header information could be read from any domains that support the HTTP TRACE method.

This vulnerability affects Web Server.

The impact of this vulnerability

Attackers may abuse HTTP TRACE functionality to gain access to information in HTTP headers such as cookies and authentication data.

 

 

How to fix this vulnerability

Disable TRACE Method on the web server.

 

 

Apache Mod_SSL Log Function Format String Vulnerability

Vulnerability description

This alert was generated using only banner information. It may be a false positive.

 

A format string vulnerability has been found in mod_ssl versions older than 2.8.19. Successful exploitation of this issue will most likely allow an attacker to execute arbitrary code on the affected computer.

 

Affected mod_ssl versions (up to 2.8.18).

 

This vulnerability affects mod_ssl.

The impact of this vulnerability

Denial of service and/or possible arbitrary code execution.

 

Attack details

Current version is mod_ssl/2.2.8 OpenSSL/0.9.8b mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.6 PHP/5.2.6

 

 

How to fix this vulnerability

Upgrade mod_ssl to the latest version.

 

 

Link to comment
https://forums.phpfreaks.com/topic/103853-test-my-site/#findComment-585539
Share on other sites

Vulnerability description

A possible sensitive file has been found. This file is not directly linked from the website. This check looks for known sensitive files like: password files, configuration files, log files, include files, statistics data, database dumps. Each of those files may help an attacker to learn more about his target.

This vulnerability affects /test.txt.

The impact of this vulnerability

This file may expose sensitive information that may help an malicious user to prepare more advanced attacks

How to fix this vulnerability

Restrict access to this file or remove it from the website.

 

Vulnerability description

A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for known sensitive directories like: backup directories, database dumps, administration pages, temporary directories. Each of those directories may help an attacker to learn more about his target.

This vulnerability affects /cache.

The impact of this vulnerability

This directory may expose sensitive information that may help an malicious user to prepare more advanced attacks.

Also Effects the following directories: /CSS , /Forums  , /Blog

 

Link to comment
https://forums.phpfreaks.com/topic/103853-test-my-site/#findComment-585540
Share on other sites

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.