LightBlog Remote File Upload Vulnerability

2008.02.06
Credit: Omni
Risk: High
Local: No
Remote: Yes
CWE: CWE-264


CVSS Base Score: 9.3/10
Impact Subscore: 10/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

LightBlog 9.5 - REMOTE FILE UPLOAD VULNERABILITY by Omni 1) Infos --------- Date : 2008-01-30 Product : LightBlog Version : v 9.5 Vendor : http://www.publicwarehouse.co.uk/ Vendor Status : 2008-01-31 Informed! 2008-01-31 Patch received from vendor! 2008-02-01 Published! Description : Lightblog provides webmasters who don't have SQL databases with a fully featured blogging system. Using text files to store data, there's no need for complicated installation procedures or a potentially pricey hosting bill. Dork : "Powered by LightBlog" - Powered by LightBlog Source : omnipresent - omni - http://omni.netsons.org E-mail : omnipresent[at]NOSPAMemail[dot]it - omni[at]NOSPAMplayhack[dot] Team : Playhack.net Security 2) Security Issues ------------------- --- [ Remote File Upload Vulnerability ] --- =============================================== A remote file upload vulnerability is present in LightBlog version 9.5. Users without permissions are able to upload any kind of files, also .php; so the attacker can upload their own remote PHP shell. The file vulnerable is: cp_upload_image.php, and you can find it under the root directory of the blog uploaded. (shown in the section PoC). --- [ PoC ] --- =============== http://localhost/light/cp_upload_image.php Just look for your PHP shell, upload it (shell.php) and then use it: http://localhost/light/images/shell.php --- [ Patch ] --- =============== - Edit the source code. - use CHMOD - Delete cp_upload_image.php - Use the vendor patch.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2017, cxsecurity.com

 

Back to Top