exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

lokicms-multi.txt

lokicms-multi.txt
Posted May 31, 2008
Authored by trueend5 | Site kapda.ir

LokiCMS versions 0.3.4 and below suffer from arbitrary file overwrite, code injection, file inclusion, and administrative hash retrieval vulnerabilities.

tags | advisory, arbitrary, vulnerability, file inclusion
SHA-256 | 1f1ae5f7ff6a42b03c2ad92a0f0f650763fb628ba8d21cd22fc17631d394f5ce

lokicms-multi.txt

Change Mirror Download
#######################################################################################
# Title: LokiCMS Multiple Vulnerabilities through Authorization weakness
# Vendor: http://www.lokicms.com
# Bugs: Arbitrary File Overwrite,Code Injection,File Inclusion,Retrieve Admin's Hash
# Vulnerable Version: LokiCMS 0.3.4 (prior versions also may be affected)
# Exploitation: Remote with browser
# Impact: Very High
# Fix: N/A
#######################################################################################

####################
- Description:
####################

LokiCMS is a content management system that is designed to be simple and clear.
Most cms systems are way to complicated if you just want to make a small mostly static site,
LokiCMS allows you to make a simple site with a few clicks.


####################
- Vulnerability:
####################
Its possible for a remote attacker to set "CMS main settings" without admin privileges.
There is a logical weakness in "admin.php" which could result in multiple vulnerabilitis
simply by set "LokiACTION" and desired parameters via http POST method.


####################
- Code Snippet:
####################

# admin.php Lines:24-42
if ( isset ( $_POST ) && isset ( $_POST['LokiACTION'] ) && strlen ( trim ( $_POST['LokiACTION'] )
) > 0 ) {
// we have an action to do
switch ( trim ( $_POST['LokiACTION'] ) ) {
case 'A_LOGOUT': // Logout
unset($_SESSION[PATH]);
break;

case 'A_LOGIN': // Login
if ( isset ( $_POST['login'] ) && sha1 ( $_POST['login'] ) == $c_password )
$_SESSION[PATH] = 'logged in lokicms030';
break;

case 'A_SAVE_G_SETTINGS': //save main settings
writeconfig ( $c_password, $_POST['title'], $_POST['header'], $_POST['tagline'],
$_POST['footnote'], $c_default, $_POST['theme'], $_POST['language'], $_POST['modrewrite'],
$_POST['simplelink'], $_POST['code'] );
$c_theme = $_POST['theme'];
include PATH . '/includes/Config.php';
include PATH . '/languages/' . $c_lang . '.lang.php';
$msg = $lang ['admin'] ['expressionSettingsSaved'];
break;

# includes/Functions.php Lines:163-200
function writeconfig ( $c_password, $c_title, $c_header, $c_tagline, $c_footnote, $c_default,
$c_theme, $c_lang, $c_modrewrite, $c_simplelink, $c_code )
{
.
.
.
$config = '<?php ' . LINEBREAK;
$config .= '// LokiCMS Config file, You can change settings in this file or via admin.php ' .
LINEBREAK;
$config .= '$c_password = \'' . $c_password . '\'; ' . LINEBREAK;
$config .= '$c_title = \'' . $c_title . '\'; ' . LINEBREAK;
$config .= '$c_header = \'' . $c_header . '\'; ' . LINEBREAK;
$config .= '$c_tagline = \'' . $c_tagline . '\'; ' . LINEBREAK;
$config .= '$c_footnote = \'' . $c_footnote . '\'; ' . LINEBREAK;
$config .= '$c_default = \'' . $c_default . '\'; ' . LINEBREAK;
$config .= '$c_theme = \'' . $c_theme . '\'; ' . LINEBREAK;
$config .= '$c_lang = \'' . $c_lang . '\'; ' . LINEBREAK;
$config .= '$c_modrewrite = ' . $c_modrewrite . '; ' . LINEBREAK;
$config .= '$c_simplelink = ' . $c_simplelink . '; ' . LINEBREAK;
$config .= '$c_code = ' . $c_code . '; ' . LINEBREAK;
$config .= '?>';

$handle = fopen ( 'includes/Config.php', 'w' );
fwrite ( $handle, $config );
fclose ( $handle );
}

####################
- Exploit :
####################
Im not going to release an exploit for this issue because of possible severe damages.

####################
- Solution :
####################
There is no solution at the time of this entry.

####################
- Credit :
####################
Discovered by: trueend5 (trueend5 [at] yahoo com)

This advisory is sponsored by FarsiList:
http://www.farsilist.ir
A Persian Web Based Electronic Maling-List Management System




Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close