当前位置: 首页 > 工具软件 > Mac's CMS > 使用案例 >

linux top 状态 s%3c,Mac's CMS 1.1.4多个缺陷及修复

那鹏
2023-12-01

############

# 标题: Mac's CMS - Multiple vilnerabilities

# 作者: Yashar shahinzadeh

# 开发者网站: http://macs-framework.sourceforge.net/

# 测试环境: Linux & Windows, PHP 5.3.4

# 影响版本:  1.1.4

###################

摘要:

========

1. CSRF - Adding/Editing administrator account

2. Cross site scripting

3. Local path disclosure

1. CSRF - 添加修改管理员账户

===============================================

Following exploits can be used against any site installed "Mac's CMS", after a successful attack a text containing "User: yashar was added successfully. Click Here to update your view" will be appeared. I only illustrate the adding user, editing is similar.

action="http:// www.hackdig.com /index.php/main/cms/saveUser" method="post">

2. Cross site scripting:

========================

There are too many XSS (Reflected and stored) in this CMS, I will provide an live example:

http://server/libs/standalone/whois/example.php/%22%3E%3Cscript%3Ealert%28%27123%27%29%3C/script%3E

3. 本地文件泄露:

=========================

There are some pages that are big leads to knowing local path, the path is valuable and can be used in Injection and... I would give an instance only:

http://server/index.php/main/cms/getComments/?controller=main&function=index&pageIndex[$test]=1&paginationKey=comments

/** Yasshar shahinzadeh **/

 类似资料: