Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Try our Premium Alert Service
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service

Category:   Application (Generic)  >   ZanfiCmsLite Vendors:   Zanfi Solutions
Zanfi CMS Lite Include File Error Lets Remote Users Execute Arbitrary Commands
SecurityTracker Alert ID:  1011612
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Oct 11 2004
Impact:   Disclosure of system information, Execution of arbitrary code via network, User access via network
Exploit Included:  Yes  
Version(s): 1.1
Description:   A vulnerability was reported in Zanfi CMS Lite. A remote user can execute arbitrary PHP code, including operating system commands, on the target system.

Cracklove reported that a remote user can supply a remote location for the 'inc' variable to cause arbitrary PHP code at the remote location to be included and executed by the target system. The PHP code, including operating system commands, will be executed with the privileges of the target web service.

A demonstration exploit URL is provided:


It is also reported that a remote user can request any of several scripts to cause the system to generate an error message that discloses the installation path. A demonstration exploit URL is provided:


Other scripts are affected, including 'corr_pages.php', 'del_block.php', 'del_page.php', 'footer.php', and 'home.php'.

The vendor has been notified without response.

The original advisory is available at:

Impact:   A remote user can execute arbitrary PHP code and operating system commands on the target system with the privileges of the target web service.

A remote user can determine the installation path.

Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Access control error, Exception handling error, Input validation error, State error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.

 Source Message Contents

Subject:  Multiple vulnerabilities in ZanfiCmsLite

*AuThor:Cracklove                * 
*HoMePaGe:    * 


Version: 1.1,The Newest Version 
Problem: Full path disclosure,Include file 


1.Full path disclosure: 

Let's try to request like this: 


and we get standard error messages like that: 

Warning: mysql_query(): supplied argument is not a valid MySQL-Link resource in c:\appserv\www\cms\adm_pages.php on line 2 
No blocks in the table 

The Problem also in corr_pages.php,del_block.php,del_page.php,footer.php,home.php etc. 

2.Include file 

Ok let's open ./index.php,We see 

if (!isset($inc)): 
    include ("home.php"); 
    include ($inc.".php"); 

O Yeah!See u Again Include Vul! 




Vuls has been reported to autuor,No reply yet. 


Greets To Lcx,Fatb,Envymask,S4T,ITS,CHT,WDYL,~The WhackerZ~ TeAm.


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, LLC