lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060209230508.5487.qmail@securityfocus.com> Date: 9 Feb 2006 23:05:08 -0000 From: rgod@...istici.org To: bugtraq@...urityfocus.com Subject: runCMS <= 1.3a2 possible remote code execution through the integrated FCKEditor package --- RunCMS <= 1.3a2 remote code execution ------------------------------------ software: site: http://www.runcms.org/public/modules/news/ description: "RUNCMS (E-Xoops) is a extensible content management system based on the v1 core of Xoops" ------------------------------------------------------------------------------ vulnerability: a user can upload a .php3 or .php5 file through the integrated FCKEditor package (calling directly the connector.php script) and execute arbitrary code & operating system commands on target machine proof of concept exploit here: i) http://retrogod.altervista.org/runcms_13a_xpl.html (also this exploits a not documented arbitrary remote inclusion issue in runcms <=1.2) ii) http://retrogod.altervista.org/fckeditor_22_xpl.html (this a generic exploit for FCKEditor 2.0 <= 2.2) ------------------------------------------------------------------------------ rgod site: http://retrogod.altervista.org mail: rgod at autistici org ------------------------------------------------------------------------------