Exploit Title: XCMS v1.83 - Remote Command Execution (RCE) Author: Onurcan Email: onurcanalcan@gmail.com Site: ihteam.net Script Download : http://www.xcms.it Date: 26/12/2022 The xcms's footer(that is in "/dati/generali/footer.dtb") is included in each page of the xcms. Taking "home.php" for example: So the xcms allow you to modify the footer throught a bugged page called cpie.php included in the admin panel. So let's take a look to the bugged code. So with a simple html form we can change the footer. Ex:
Note: This is NOT a CSRF, this is just an example to change the footer without the admin credentials. Trick: We can change the admin panel password by inserting this code in the footer: "); fclose($f); ?> This code delete the old password file and then create a new one with your new password. Fix: So this is a simple exploit: "; }else{ echo"XCMS <= v1.82 Remote Command Execution Vulnerability Dork : inurl:\"mod=notizie\" by Onurcan Visit ihteam.net"; } ?>