eFront <= 3.5.1 / build 2710: Remote File Inclusion Vulnerability

2008.10.02
Credit: Pepelux
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-264


CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- eFront <= 3.5.1 / build 2710: Remote File Inclusion Vulnerability -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- $ Program: eFront $ File affected: studentpage.php / professorpage $ Version: 3.5.1 / build 2710 $ Download: http://www.efrontlearning.net Found by Pepelux <pepelux[at]enye-sec.org> eNYe-Sec - www.enye-sec.org -- Description (by the author's page) -- eFront is an easy to use, visually attractive, SCORM compatible, eLearning and Human Capital Development system. It is suitable for both company and educational usage. The core eFront system is offered as open-source software so you can download and start using it immediately. Check the functionality matrix for different eFront editions. -- Bug -- If you are a student or a teacher you can upload an avatar. It not check the extension (JPG, PNG, GIF, ...) and you can upload any file (ex: PHP) Website structure: site.com / /upload/ -> Files saved /admin/ /avatars /student/ /avatars /professor/ /avatars /www -> Website /backups /libraries -- Exploit -- Students can upload a shell.php as the avatar ant next execute as: http://site/upload/student/avatars/shell.php Teachers can upload a shell.php as the avatar ant next execute as: http://site/upload/professor/avatars/shell.php Note: in all sites I've tested upload dorectory is accesible by web

References:

http://www.securityfocus.com/bid/31491
http://forum.efrontlearning.net/viewtopic.php?f=1&t=271
http://xforce.iss.net/xforce/xfdb/45574
http://www.securityfocus.com/archive/1/archive/1/496851/100/0/threaded
http://www.osvdb.org/54294
http://www.milw0rm.com/exploits/6633


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top