| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060209230508.5487.qmail@securityfocus.com>
Date: 9 Feb 2006 23:05:08 -0000
From: rgod@...istici.org
To: bugtraq@...urityfocus.com
Subject: runCMS <= 1.3a2 possible remote code execution through the
integrated FCKEditor package
--- RunCMS <= 1.3a2 remote code execution ------------------------------------
software:
site: http://www.runcms.org/public/modules/news/
description: "RUNCMS (E-Xoops) is a extensible content management system based
on the v1 core of Xoops"
------------------------------------------------------------------------------
vulnerability: a user can upload a .php3 or .php5 file through the integrated
FCKEditor package (calling directly the connector.php script) and execute
arbitrary code & operating system commands on target machine
proof of concept exploit here:
i) http://retrogod.altervista.org/runcms_13a_xpl.html
(also this exploits a not documented arbitrary remote inclusion issue in runcms <=1.2)
ii) http://retrogod.altervista.org/fckeditor_22_xpl.html
(this a generic exploit for FCKEditor 2.0 <= 2.2)
------------------------------------------------------------------------------
rgod
site: http://retrogod.altervista.org
mail: rgod at autistici org
------------------------------------------------------------------------------