I got today on a new site already a password hacker. He was try it 4 times. this is his try and data:
Total impact: 30
Affected tags: dt, id, lfi
Variable: REQUEST.go |
Value: ./../../../../../../../../etc/passwd
Impact: 15 | Tags: dt, id,
lfi
Description: Detects basic directory traversal | Tags: dt, id, lfi | ID:
10
Description: Detects specific directory and path traversal | Tags: dt, id,
lfi | ID: 11
Description: Detects etc/passwd inclusion attempts | Tags: dt,
id, lfi | ID: 12
Variable: GET.go | Value:
./../../../../../../../../etc/passwd
Impact: 15 | Tags: dt, id,
lfi
Description: Detects basic directory traversal | Tags: dt, id, lfi | ID:
10
Description: Detects specific directory and path traversal | Tags: dt, id,
lfi | ID: 11
Description: Detects etc/passwd inclusion attempts | Tags: dt,
id, lfi | ID: 12
REMOTE_ADDR: 194.24.174.51
HTTP_X_FORWARDED_FOR:
HTTP_CLIENT_IP:
SCRIPT_FILENAME:
/home/xxxx/domains/xxxxxl/public_html/index.php
QUERY_STRING:
go=./../../../../../../../../etc/passwd
REQUEST_URI:
/index.php?go=./../../../../../../../../etc/passwd
QUERY_STRING:
go=./../../../../../../../../etc/passwd
SCRIPT_NAME: /index.php
PHP_SELF:
/index.php