vendor:
Pligg CMS
by:
Jelmer de Hen
7.5
CVSS
HIGH
Privilege Escalation
264
CWE
Product Name: Pligg CMS
Affected Version From: 1.1.2003
Affected Version To: 1.1.2003
Patch Exists: YES
Related CWE: N/A
CPE: a:pligg:pligg_cms
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2011
Pligg CMS file existence exploration/shared hosting privilege escalation
Pligg CMS version 1.1.3 is vulnerable to a file existence exploration/shared hosting privilege escalation attack. This attack is possible due to the code in config.php near line 80, which allows a user to set a cookie named 'template' and give it the right directory as value. This can be exploited by creating a cookie named 'template' and giving it the directory of the vulnerable code, which will include(); the file and allow the attacker to execute code as the other user. This attack is especially dangerous in a shared hosting environment, as the attacker can prepare a 'pligg.tpl' file inside a directory called 'templates' and browse to the directory where they stored it to the vulnerable code.
Mitigation:
Upgrade to the latest version of Pligg CMS, which is 1.1.4. Additionally, users should ensure that the 'template' cookie is properly sanitized and that the code is not vulnerable to directory traversal attacks.