CiviCRM 3.1 < Beta 5 - Multiple XSS Vulnerabilities

2010-01-13T00:00:00
ID EDB-ID:11124
Type exploitdb
Reporter h00die
Modified 2010-01-13T00:00:00

Description

CiviCRM 3.1 < Beta 5 Multiple XSS Vulnerabilities. Webapps exploit for php platform

                                        
                                            # Author: h00die (mcyr2@csc.com) & Ch3nz (vpierorazio@csc.com)
# Software Link: http://sourceforge.net/projects/civicrm/files/civicrm-latest/3.1.beta1/civicrm-3.1.beta1-standalone.tar.gz/download
# Version: &lt; 3.1 Beta 5, Tested on 3.1 Beta 1
# Tested on: BT4 pre-final
# Greetz to muts and loganWHD
# http://www.offensive-security.com/offsec101.php turning script kiddies into ninjas daily


#Timeline
#Discovery Date: Dec 9 2009
#Vendor Notification: Dec 31 2009
#Vendor Patch: Jan 13, 2010.  Update to Beta 5 with fixes, also patch for Beta 4 released.
#Public Disclosure: Jan 13, 2010

#Background: Separated XSS Injection
#########################################################
CiviCRM uses a fairly complex filtering system to try to prevent attacks, yet still have the highest level of flexibility.
One of those filters prevents &lt;script&gt; and &lt;/script&gt; from being in the same input box.
In several cases it is possible to use multiple input boxes that get displayed later either together or close enough that it is
possible to inject the 1st half of the code in the first box with a trailing comment, then inject the end comment and end script
in the second box.  We call this Separated XSS Injection.  For instance, you have input box 1, and input box 2.  It is not possible
to get by the IDS in the software by injecting &lt;script&gt;alert(1);&lt;/script&gt; into either of those boxes.  When the content is later 
displayed it is displayed in a table consisting of: Input box 1, ID# (auto generated), Input box 2.  By injecting &lt;script&gt;alert(1);//
into input box 1, and //--&gt;&lt;/script&gt; into input box 2 the content in the table then becomes:
&lt;script&gt;alert(1);// &lt;/td&gt;&lt;td&gt;ID#&lt;/td&gt;&lt;td&gt; //--&gt;&lt;/script&gt;.  This script is now executable even though it was split and injected
into different areas.  
#########################################################


#Vulnerable injection points
#########################################################
1. Tags 
  1a. HTML injection in both the Name and Description fields.
  1b. Separated XSS Injection using the Name and Description input boxes.  When the data is displayed, there is an ID field between
      the two items, so in order to inject data but still have it look correctly try this:
       Name: Tag&lt;script&gt;alert(1);//
       Description: //--&gt;&lt;/script&gt;&lt;/td&gt;&lt;td&gt;1&lt;/td&gt;&lt;td&gt;Description&lt;/td&gt; 
      Keep in mind Name has ~64 char limit, Description is a 255 character limit
2. Groups
  2a. HTML injection in both the Name and Description fields.
  2b. Separated XSS Injection using the Name and Description input boxes.  When the data is displayed, there is an ID field between
      the two items, so in order to inject data but still have it look correctly try this:
       Name: Group&lt;script&gt;alert(1);//
       Description: //--&gt;&lt;/script&gt;&lt;/td&gt;&lt;td&gt;1&lt;/td&gt;&lt;td&gt;Description&lt;/td&gt; 
      Keep in mind Name has ~64 char limit.
      ***Also, since this data gets displayed in the Recent Items column on the left, it will break the interface.  It also breaks
         the Settings page for the group, so this data cannot be altered once input w/o editing the DB by hand***
3. Contributions
  3a. Source Notes, and Transaction ID are HTML injectable
  3b. Separated XSS Injection using the Honoree First Name and Last Name input boxes.  When the data is displayed, there are no fields between
      the two items, so this is a safer injection point, but the xss does not display unless the user views the individual contribution.
      Safe Injection Data:
       First Name: Matt&lt;script&gt;alert(1);
       Last Name: &lt;/script&gt; Smith
      This attack also creates the Honoree as a person element in the system, so attacks are further reaching
  3c. The Honoree First/Last Name fields have a length bug.  When inserting a user to the system there is a 64 character limit on First/Last
      Names.  When inserting an honoree's First/Last name, there is no control on that.  The data is then inserted into the Database as is,
      and when the data is displayed, it is SHOWN at 64 characters even though all the characters are actually valid.  What does this mean?
      Let's look back at 3b, we can now do the following
       First Name: 1234567890123456789012345678901234567890123456789012345678901234&lt;script&gt;alert('xss attack');
       Last Name: &lt;/script&gt; LastName
      Now when we view the contact's Details (for 1234...), and try to Edit the data the &lt;script&gt;alert('xss attack'); part is not displayed.
      This could be a good method of hiding the attack a little better.
4. Address Field
  4a. Separated XSS Injection using the Addt'l Address 1 and Addt'l Address 2 input boxes.  When the data is displayed, there is a
      &lt;/span&gt;&lt;br /&gt; between the two items, so in order to inject data we must comment out that part like so:
       Addt'l Address 1: &lt;script&gt;alert('xss');//
       Addt'l Address 2: //--&gt;&lt;/script&gt; 
      Keep in mind each address field has a ~96 char limit.
#########################################################