exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29999
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code by manipulating the `g_DocumentRoot` parameter to include a remote shell.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote shell accessible via URL · Target server with vulnerable Campsite installation
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29998
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code by manipulating the `g_DocumentRoot` parameter in `User.php`. The PoC provides a URL example to include a remote shell.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file hosting with shell payload · Network access to the target
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29997
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code by manipulating the `g_DocumentRoot` parameter in the `UrlType.php` script.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the target server · Attacker must be able to host a malicious file on a remote server
exploitdb
WRITEUP
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29996
The provided text describes a remote file inclusion vulnerability in Campsite 2.6.1, allowing remote code execution via the `g_DocumentRoot` parameter. However, it lacks actual exploit code, making it a writeup rather than a working PoC.
Classification
Writeup 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion vulnerability in Campsite 2.6.1 · Ability to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29995
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code by manipulating the `g_DocumentRoot` parameter in the `TimeUnit.php` file.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote access to the vulnerable web application
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29994
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code by manipulating the `g_DocumentRoot` parameter in the `Template.php` file.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the target server · Attacker must be able to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29993
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1 by manipulating the `g_DocumentRoot` parameter to include a remote shell. The attack allows arbitrary code execution in the context of the webserver.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the target server · Attacker must be able to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29992
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code by manipulating the `g_DocumentRoot` parameter to include a remote shell.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the server · Attacker must be able to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29991
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code by manipulating the `g_DocumentRoot` parameter to include a remote shell.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote shell accessible via URL · PHP allow_url_include enabled
exploitdb
WRITEUP
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29990
The provided text describes a remote file inclusion vulnerability in Campsite 2.6.1, allowing remote code execution by manipulating the `g_DocumentRoot` parameter. However, no actual exploit code is included, only a reference URL and a brief description.
Classification
Writeup 80%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled · Attacker-controlled server to host malicious file
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29989
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1 by manipulating the `g_DocumentRoot` parameter in `ShortURL.php` to include and execute arbitrary remote code.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the target server · Attacker must be able to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29988
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code by manipulating the `g_DocumentRoot` parameter in the `Section.php` file.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the server · Attacker must be able to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29987
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code by manipulating the g_DocumentRoot parameter to include a remote shell.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the target server · Attacker must be able to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29986
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code by manipulating the g_DocumentRoot parameter to include a remote shell.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the server · Attacker must be able to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29985
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code by manipulating the `g_DocumentRoot` parameter in the `Log.php` file.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the server · Attacker must be able to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/30006
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code by manipulating the `g_DocumentRoot` parameter to include a remote shell.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote shell accessible via URL · Target server with vulnerable Campsite installation
exploitdb
WRITEUP
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/30005
The provided text describes a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code via a crafted URL. However, the example lacks executable exploit code, making it a writeup rather than a working PoC.
Classification
Writeup 80%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion vulnerability in Campsite · Ability to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29984
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code by manipulating the `g_DocumentRoot` parameter in the `Language.php` file.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the server · Attacker must be able to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29983
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code by manipulating the g_DocumentRoot parameter to include a remote shell.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote shell file hosted on an accessible server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29982
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code by manipulating the g_DocumentRoot parameter in the Issue.php script.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the target server · Attacker must be able to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29980
This exploit leverages a remote file inclusion vulnerability in Campsite 2.6.1 by manipulating the `g_DocumentRoot` parameter in `IPAccess.php` to include and execute arbitrary remote code.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the target server · Attacker must be able to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29981
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1 by manipulating the `g_DocumentRoot` parameter in `Image.php` to include and execute arbitrary remote files. The attack vector is straightforward, requiring no authentication.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file hosting with executable code (e.g., shell.txt)
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29979
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code by manipulating the `g_DocumentRoot` parameter in the `Event.php` file.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the target server · Attacker must be able to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29978
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code by manipulating the `g_DocumentRoot` parameter to include a remote shell.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the target server · Attacker must be able to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29977
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code by manipulating the `g_DocumentRoot` parameter to include a remote shell.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the target server · Attacker must be able to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29976
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1 by manipulating the g_DocumentRoot parameter to include a remote shell. The attack leverages improper input validation to execute arbitrary code.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file hosting with shell payload · Network access to target
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29975
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing remote attackers to execute arbitrary code by manipulating the `g_DocumentRoot` parameter in the `ArticleType.php` script.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the target server · Attacker must be able to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29974
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code by manipulating the g_DocumentRoot parameter. The PoC provides a URL example to trigger the vulnerability.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the target server · Attacker must be able to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29973
This exploit leverages a remote file inclusion vulnerability in Campsite 2.6.1 by manipulating the `g_DocumentRoot` parameter to include and execute arbitrary remote code. The attack is straightforward and requires no authentication.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the target server · Attacker must be able to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29972
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1 by manipulating the `g_DocumentRoot` parameter to include a remote shell. The vulnerability allows arbitrary code execution in the context of the webserver.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the server · Attacker must be able to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29971
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code by manipulating the `g_DocumentRoot` parameter in `ArticleImage.php`. The PoC provides a URL example to include a remote shell.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the target server · Attacker must be able to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29970
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code by manipulating the `g_DocumentRoot` parameter to include a remote shell.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the target server · Attacker must be able to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29969
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code by manipulating the `g_DocumentRoot` parameter to include a remote shell.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the server · Attacker must be able to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29968
The exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1 by manipulating the `g_DocumentRoot` parameter to include and execute arbitrary remote files. This leads to remote code execution in the context of the webserver.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file hosting with executable code · Network access to the target webserver
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29967
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1 by manipulating the `g_DocumentRoot` parameter to include a remote shell. The attack relies on improper input validation to execute arbitrary code.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the server · Attacker must be able to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/29966
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code by manipulating the `g_DocumentRoot` parameter in the `Alias.php` file. The PoC provides a URL example to include a remote shell file.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the server · Attacker must be able to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/30004
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code by manipulating the `g_DocumentRoot` parameter in `db_connect.php`. The PoC provides a URL example to include a remote shell file.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote shell file hosted on an accessible server
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/30003
This exploit demonstrates a remote file inclusion vulnerability in Campsite 2.6.1, allowing attackers to execute arbitrary code by manipulating the g_DocumentRoot parameter in configuration.php. The PoC provides a URL example to include a remote shell file.
Classification
Working Poc 90%
Target:
Campsite 2.6.1
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the target server · Attacker must be able to host a malicious file on a remote server