Exotic Cams suffers from cross site scripting and local file inclusion vulnerabilities.
57802f2fa8c7315d7a1677cab3c721ce2fb44c4458cf15cdf1859594b9208b5a
##########################[andresg888]##########################
# Exploit Title : Exotic-Cams --LFI & XSS--
# Date : 2010-01-09
# Author : andresg888
# Software Link : http://www.ppvchat.com/
# Contact : andresg888[4t]gmail[dot]com
# Dork : No DoRk f0R ScRipT KiDDieS
########################################################################
# Example LFI: http://www.ppvchat.com/demo/template03/registration/model.php
# Example XSS: Go to registration/user.php and in "City" put %00"'>
# Submit the form and see response.
########################################################################
# Malicious users may upload shell's in order to gather control from the site.
# Malicious users may inject JavaScript, VBScript, ActiveX, HTML or Flash into a vulnerable
# application to fool a user in order to gather data from them. An attacker can steal the
# session cookie and take over the account.
########################################################################
#Solution for lfi: Check if the script inputs are properly validated.
#Solution for xss: $_GET = preg_replace("|([^\w\s\'])|i",'',$_GET);
# $_POST = preg_replace("|([^\w\s\'])|i",'',$_POST);
########################################################################
# Greetz : _84kur10_ , Brunos_50, mmrg5486, LU73K, Joshu4X, 3l_d105_4r35
# Special Greetz : all members from montevideolibre
##########################[andresg888]#################################