There is no bug so no exploit can exist. File /etc/passwd is readable by any user (inside PHP with safe_mode disabled also) as it doesn't contain very sensitive information such as user passwords. Double check what are you posting before actually doing it please. Regards --- On Sun, 1/4/09, l1un@xxxxxxxxxxx <l1un@xxxxxxxxxxx> wrote: > From: l1un@xxxxxxxxxxx <l1un@xxxxxxxxxxx> > Subject: php 4.x php5.2.x all "show_source()" ,"highlight_file()" bypass‏ > To: bugtraq@xxxxxxxxxxxxxxxxx > Date: Sunday, January 4, 2009, 11:39 AM > Ahthoer:Super-Crystal > www.arab4services.net > safe_mode off (tested) > <? > show_source ('/etc/passwd'); > ?> > Example exploit: > <? > show_source ('/home/user/public_html/config.php'); > ?> > ----------------------------- > highlight_file() > > <? > highlight_file ("/etc/passwd"); > ?> > exploit !!! > <code><span style="color: #000000"> > root:x:0:0:root:/root:/bin/bash<br > />bin:x:1:1:bin:/bin:/sbin/nologin<br > />daemon:x:2:2:daemon:/sbin:/sbin/nologin<br > />adm:x:3:4:adm:/var/adm:/sbin/nologin<br > />lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin<br > />sync:x:5:0:sync:/sbin:/bin/sync<br > />shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown<br > />halt:x:7:0:halt:/sbin:/sbin/halt<br > />mail:x:8:12:mail:/var/spool/mail:/sbin/nologin<br > />news:x:9:13:news:/etc/news:<br > />uucp:x:10:14:uucp:/var/spool/uucp:/sbin/nologin<br > />operator:x:11:0:operator:/root:/sbin/nologin<br > />games:x:12:100:games:/usr/games:/sbin/nologin<br > />gopher:x:13:30:gopher:/var/gopher:/sbin/nologin<br > />ftp:x:14:50:FTP User:/var/ftp:/sbin/nologin<br > />nobody:x:99:99:Nobody:/:/sbin/nologin<br > />dbus:x:81:81:System message bus:/:/sbin/nologin<br > > :) > > greetz:php.net! > > th4nx securityfocus