This exploit targets a file write vulnerability in q-news 2.0's `wsettings.php`, allowing arbitrary PHP code injection into `settings.php`. The Perl script automates the injection of a command execution payload and provides a shell interface.
Classification
Working Poc 95%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target:q-news 2.0
No auth needed
Prerequisites:Target must have writable `settings.php` file · PHP execution enabled on the server