CMS Made Simple 1.11.2 Cross Site Request Forgery Vulnerability

ID 1337DAY-ID-19704
Type zdt
Reporter High-Tech Bridge
Modified 2012-11-08T00:00:00


CMS Made Simple version 1.11.2 suffers from a cross site request forgery vulnerability.

                                            Product: CMS Made Simple
Vulnerable Version(s): 1.11.2 and probably prior
Tested Version: 1.11.2
Vendor Notification: October 17, 2012 
Public Disclosure: November 7, 2012 
Vulnerability Type: Cross-Site Request Forgery [CWE-352]
CVE Reference: CVE-2012-5450
CVSSv2 Base Score: 2.6 (AV:N/AC:H/Au:N/C:N/I:N/A:P)
Solution Status: Fixed by Vendor
Risk Level: Low 
Discovered and Provided: High-Tech Bridge Security Research Lab ( ) 


Advisory Details:

High-Tech Bridge Security Research Lab discovered vulnerability in CMS Made Simple, which can be exploited to perform cross-site request forgery (CSRF) attacks.

1. Сross-Site Request Forgery (CSRF) in CMS Made Simple: CVE-2012-5450

The application allows authorized administrator to perform certain actions via HTTP requests without making proper validity checks to verify the source of the requests. This can be exploited to delete arbitrary files and directories.

An attacker should make logged-in administrator open a malicious link in the browser to exploit this vulnerability.

The following PoC (Proof of Concept) code will delete the root directory with all files leading to complete destroy of the CMS:

<img src="http://[host]/lib/filemanager/imagemanager/images.php?deld=../../" width=1 height=1>

Successful exploitation requires that user under which the web server is running has write access to files or directories to delete. 



Upgrade to CMS Made Simple

More Information:


# [2018-04-12]  #