This exploit demonstrates a Local File Inclusion (LFI) vulnerability in thEngine via the `strLanguage` parameter in `test.class.php`. The PoC shows how an attacker can include arbitrary files by appending a null byte (`%00`) to bypass file extension checks.
Classification
Working Poc 90%
Attack Type
Lfi
Complexity
Trivial
Reliability
Reliable
Target:thEngine (version not specified)
No auth needed
Prerequisites:Access to the vulnerable `test.class.php` endpoint