SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Forum/Board/Portal)  >   GreenBeast CMS Vendors:   GreenBeastCMS.com
GreenBeast CMS Lets Remote Users View Filenames and Potentially Upload Files
SecurityTracker Alert ID:  1017176
SecurityTracker URL:  http://securitytracker.com/id/1017176
CVE Reference:   CVE-2006-5833   (Links to External Site)
Updated:  Jun 3 2008
Original Entry Date:  Nov 7 2006
Impact:   Disclosure of system information, Disclosure of user information, Modification of user information
Exploit Included:  Yes  
Version(s): 1.3
Description:   A vulnerability was reported in GreenBeast CMS. A remote user can view certain file and directory names on the target system. On some systems, a remote user may be able to upload arbitrary files.

A remote user can directly access the 'up_loader.php' file upload script without authenticating by loading the following type of URL:

http://[target]/gbcms_php_files/up_loader.php

This script displays certain directory and filenames. Depending on the permissions set on the target system, a remote user may be able to upload files to certain directories on the target system.

skulmatic discovered this vulnerability.

The original advisory is available at:

http://newhack.org/advisories/GreenBeastCMS.txt

Impact:   A remote user can view certain file and directory names on the target system.

A remote user may be able to upload arbitrary files to the target system (depending on the permissions set on the target system).

Solution:   No solution was available at the time of this entry.
Vendor URL:  greenbeastcms.com/ (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  GreenBeast CMS <= 1.3 PHP Arbitrary File Upload Vulnerability

GreenBeast CMS v.1.3

########################################################################

Memanfaatkan uploader GreenBeast CMS

Found  by    =  skulmatic ( skulmatic [at] gmail.com )

Script site   =  http://greenbeastcms.com


Vulnerable  = "gbcms_php_files/up_loader.php"

                    http://[site]/gbcms_php_files/up_loader.php


Dork       =  gbcms_login.php

########################################################################

-----
Original Advisor
http://newhack.org/advisories/GreenBeastCMS.txt

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC