header-logo
Suggest Exploit
vendor:
SweetRice
by:
ITSecTeam
9,3
CVSS
HIGH
Remote File Upload
264
CWE
Product Name: SweetRice
Affected Version From: 0.6.4
Affected Version To: 0.6.4
Patch Exists: YES
Related CWE: CVE-2011-4010
CPE: cpe:a:basic-cms:sweetrice:0.6.4
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Linux, Windows, Mac
2011

SweetRice 0.6.4 (fckeditor) Remote File Upload

SweetRice 0.6.4 is vulnerable to a remote file upload vulnerability. An unauthenticated attacker can upload files with certain extensions to the server. This can be exploited to upload malicious files such as webshells, leading to remote code execution.

Mitigation:

Upgrade to SweetRice 0.6.5 or later.
Source

Exploit-DB raw data:

##############################################################################
#Title:             SweetRice < 0.6.4 (fckeditor) Remote File Upload         #
#Vendor:            http://www.basic-cms.org                                 #
#Dork:              "Powered By Basic CMS SweetRice"                         #
##############################################################################
#AUTHOR:            ITSecTeam                                                #
#Email:             Bug@ITSecTeam.com                                        #
#Website:           http://www.itsecteam.com                                 #
#Forum :            http://forum.ITSecTeam.com                               #
#Original Advisory: www.ITSecTeam.com/en/vulnerabilities/vulnerability56.htm #
#Thanks:            r3dm0v3,Mehr@n.s,Pejvak,am!rkh@n                         #
##############################################################################

#DESCRIPTION (by vendor):#####################################################
SweetRice is a most simple program for website management.Perfect support web 
standards,easy to setup and use.best value is SEO.Support 3 kinds of 
database:Mysql,Sqlite,PostgreSql,support database time line.


#BUG:#########################################################################
file /_plugin/fckeditor/editor/filemanager/connectors/php/config.php:
 125: $Config['AllowedExtensions']['File']	= array('7z', 'aiff', 'asf', 'avi', 'bmp', 'csv', 'doc', 'fla', 'flv', 'gif', 'gz', 'gzip', 'jpeg', 'jpg', 'mid', 'mov', 'mp3', 'mp4', 'mpc', 'mpeg', 'mpg', 'ods', 'odt', 'pdf', 'png', 'ppt', 'pxd', 'qt', 'ram', 'rar', 'rm', 'rmi', 'rmvb', 'rtf', 'sdc', 'sitd', 'swf', 'sxc', 'sxw', 'tar', 'tgz', 'tif', 'tiff', 'txt', 'vsd', 'wav', 'wma', 'wmv', 'xls', 'xml', 'zip') ;
 126: $Config['DeniedExtensions']['File']		= array() ;

its not possible to upload shells but remote user can upload files with definned extensions without authentication.


#EXPLOIT:####################################################################
http://site.com/_plugin/fckeditor/editor/filemanager/connectors/test.html