Google Search: intext:”Powered by CubeCart 3.0.6″ intitle:”Powered by CubeCart”
HaVoC88 rates this entry 6 out of 10.
Submitted: 2005-12-31 00:00:00
Added by: HaVoC88
CubeCart is an eCommerce script written with PHP & MySQL. Search CubeCart 3.0.6 portal vulnerable. The vulnerability is Remote Command Execution. See http://milw0rm.com/id.php?id=1398Moderator note: “Moving milw0rm once again. This time hosted by asylum-networks.com. /str0ke”
2006-01-20 10:20:42 (Timo): awesum many many victims and a good remote command execution exploit i didn’t figure out how i use these exploits yet tough i think i need to upload a shell but i’m having trouble not knowing the upload shell command…
2006-01-23 11:19:52 (komenggg): it’s Horrifying, 15.000 target and 70% are vulnarable. Go Go HaVoC88 , Go Go johnny.
2006-01-30 03:39:16 (Anonymous): http://milw0rm.com/id.php?id=1398
^^ in the cmd.txt what exactly am i suppose to put?
someone help me out pls
2006-02-08 16:27:45 (HaVoC88): cmd.txt need to be replaced with an url that use remote command executation.
Try to view here: http://geocities.com/liz0zim/