#====================================================================================================# # ____ __________ __ ____ __ # # /_ | ____ |__\_____ \ _____/ |_ /_ |/ |_ # # | |/ \ | | _(__ <_/ ___\ __\ ______ | \ __\ # # | | | \ | |/ \ \___| | /_____/ | || | # # |___|___| /\__| /______ /\___ >__| |___||__| # # \/\______| \/ \/ # #====================================================================================================# # This is a public Exploit # #====================================================================================================# # ExBB <= 0.22 # # Multiple File Inclusion / Code Execution Vulnerability # # # #====================================#===============#====================================#==========# # Server Configuration Requirements # # Some Information # # #====================================# #====================================# # # # # # [RFI] [LFI] # Vendor: exbb.clans.it # # # Author: The:Paradox # # register_globals = 1 register_globals = 1 # Severity: Moderately Critical # # allow_url_fopen = 1 magic_quotes_gpc = 0 # # # allow_url_finculde = 1 # Proud To Be Italian. # # # # #====================================#===============#===============================================# # Proof Of Concept / Bug Explanation # # #====================================# # # Exbb presents File Inclusion Vulnerabilities. Let's have a look of the source. # # # # /modules/threadstop/threadstop.php # # # # 1.