MarieCMS v0.9 vulnerable to Remote File Inclusion, Local File Inclusion, Persistent XSS and Shell Upload (Authenticated User)
MarieCMS v0.9 is vulnerable to Remote File Inclusion, Local File Inclusion, Persistent XSS and Shell Upload (Authenticated User). For Remote File Inclusion, an attacker can send a malicious URL to the vulnerable server in the page parameter. For Local File Inclusion, an attacker can send a malicious URL to the vulnerable server in the mod parameter. For Persistent XSS, an attacker can put a malicious script in the Name field on the page http://server/mariecms/?page=addgb&mod=gaestebuch. For Shell Upload (Authenticated User), an attacker can rename shell.php to shell.jpg.php and upload it into the galleryupload section. Then, the attacker can view images to get the image id for shell.jpg.php and access the shell.