Facil-CMS Local and Remote File Include Vulnerabilities
BID:39197
Info
Facil-CMS Local and Remote File Include Vulnerabilities
| Bugtraq ID: | 39197 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 04 2010 12:00AM |
| Updated: | Apr 12 2010 06:33PM |
| Credit: | eidelweiss |
| Vulnerable: | |
| Not Vulnerable: | |
Discussion
Facil-CMS Local and Remote File Include Vulnerabilities
Facil-CMS is prone to a local file-include vulnerability and a remote file-include vulnerability because the application fails to sufficiently sanitize user-supplied input.
Exploiting these issues may allow a remote attacker to obtain sensitive information or to compromise the application and the underlying computer; other attacks are also possible.
Facil-CMS 0.1RC2 is vulnerable; other versions may also be affected.
Facil-CMS is prone to a local file-include vulnerability and a remote file-include vulnerability because the application fails to sufficiently sanitize user-supplied input.
Exploiting these issues may allow a remote attacker to obtain sensitive information or to compromise the application and the underlying computer; other attacks are also possible.
Facil-CMS 0.1RC2 is vulnerable; other versions may also be affected.
Exploit / POC
Facil-CMS Local and Remote File Include Vulnerabilities
An attacker can exploit these issues via a browser.
The following example URIs are available:
http://www.example.com/facil-cms/index.php?getSiteIndex=../../../../../../../../etc/passwd%00
http://www.example.com/facil-cms//includes/facil-settings.php?FACIL_THEME= [rfi shell]
An attacker can exploit these issues via a browser.
The following example URIs are available:
http://www.example.com/facil-cms/index.php?getSiteIndex=../../../../../../../../etc/passwd%00
http://www.example.com/facil-cms//includes/facil-settings.php?FACIL_THEME= [rfi shell]
Solution / Fix
Facil-CMS Local and Remote File Include Vulnerabilities
Solution:
Vendor update is available. Please see the references for more information.
Solution:
Vendor update is available. Please see the references for more information.