githubEdit

CMS Made Simple

Discovery

# Cookie in HTTP requests identifies the CMS
Cookie: CMSSESSID9d372ef93962=njl8ca7p398vm8ca0n6l0jnuq7

# Meta tag in HTML source
<meta name="Generator" content="CMS Made Simple - Copyright (C) 2004-2019. All rights reserved." />

# moduleinterface.php exists
http://TARGET/writeup/moduleinterface.php

Eeyore DoS Protection

Some installations have DoS protection that monitors Apache 40x errors and bans IPs:

Eeyore DoS protection script that is in place and
watches for Apache 40x errors and bans bad IPs.

This blocks:

  • Directory fuzzing (feroxbuster, gobuster, ffuf)

  • Nikto scans

  • SQLMap

Workaround: Target known endpoints directly, avoid triggering 404s.


CVE-2019-9053 - SQL Injection

Exploitation:

Output:


Cracking the Hash

CMS Made Simple uses md5($salt.$pass) - Hashcat mode 20.

Last updated