vendor:
Tilde CMS
by:
Paolo Forte, Raffaele Forte
7,5
CVSS
HIGH
SQL Injection, Path Traversal, Arbitrary Files Upload
89, 22, 264
CWE
Product Name: Tilde CMS
Affected Version From: Tilde CMS 1.0.1
Affected Version To: Tilde CMS 1.0.1
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Ubuntu 12.04, PHP 5.3.10
2017
Tilde CMS 1.01 Multiple Vulnerabilities
Due to missing escaping of the backtick character, the following query in the source code is vulnerable. The vulnerability can be trigged via a POST request. The vulnerability exists on this method: GET /actionphp/download.File.php?&file=../../../../../../etc/passwd. It is possible to bypass the implemented restrictions by uploading a malicious file with a double extension, such as 'file.php.txt'.
Mitigation:
Ensure that user input is properly sanitized and escaped before being used in a SQL query. Use a whitelist of allowed characters and escape all other characters. Use parameterized queries to prevent SQL injection. Use a whitelist of allowed file extensions and validate the file type before accepting the file.