[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20070408083710.9954.qmail@securityfocus.com>
Date: 8 Apr 2007 08:37:10 -0000
From: the_3dit0r@...oo.com
To: bugtraq@...urityfocus.com
Subject: xodagallery Remote Code Execution Vulnerability
"""""""""""""""""""""""""""""""""""""""""""""""
""" :: :: ::::: :::: """
""" :: :: :: : :: """
""" :::: :: :: ::::: ::::: :::: """
""" :: :: ::: ::: :: :: :: :: :: """
""" :: :: :: : : ::::: :: :: :::: """
""" """
"""""""""""""""""""""""""""""""""""""""""""""""
Xmor$ Security Vulnerability Research TM
# Tilte: xodagallery Remote Code Execution Vulnerability
# Author..................: [the_Edit0r]
# HomePage ...............: [Www.XmorS-sEcurity.coM]
# Location ...............: [Iran]
# Software ...............: [xodagallery]
# Impact..................: [ Remote ]
# Site Script ............: [http://sourceforge.net/projects/xodagallery/]
# We ArE .................: [ Scorpiunix,KAMY4r,Zer0.Cod3r,SilliCONIC,D3vil_B0y_ir,S.W.A.T,DarkAngel ]
------------------------------------- Codes --------------------------------
switch ($_GET['cmd']) line 64
------------------------------- proof Of Concept ---------------------------
www.example.com/[path]/administration.php?cmd=[Command]
----------------------------------------------------------------------------
# Contact me : the_3dit0r[at]Yahoo[dot]coM
# [XmorS-SEcurity.coM]
Powered by blists - more mailing lists