CMS Chainuk <= v.1.2 Vulns
The CMS Chainuk version 1.2 is vulnerable to LFI, XSS and Shell injection. The vulnerability exists in the index.php, admin_edit.php, admin_delete.php and admin_menu.php files. An attacker can exploit the vulnerability by sending a malicious payload in the form of a GET request to the vulnerable files. For example, an attacker can send a malicious payload in the form of a GET request to the index.php file with the parameter 'id' set to '../../../../etc/passwd%00' to exploit the LFI vulnerability. Similarly, an attacker can send a malicious payload in the form of a GET request to the admin_delete.php file with the parameter 'id' set to '../FILE.PHP%00' to exploit the Shell injection vulnerability. Lastly, an attacker can send a malicious payload in the form of a POST request to the admin_menu.php file with the parameter 'menu' set to '../../../../etc/passwd%00' to exploit the XSS vulnerability.