Syncrify Server <= 3.6 Build 833 - CSRF / XSS Vulnerabilities

ID 1337DAY-ID-23614
Type zdt
Reporter Marlow Tannhauser
Modified 2015-05-09T00:00:00


Exploit for php platform in category web applications

                                            # Exploit Title: Multiple vulnerabilities in Syncrify Server 3.6 Build 833 (CSRF/Stored XSS)
# Date: 07-05-2015
# Exploit Author: Marlow Tannhauser
# Contact: [email protected]
# Vendor Homepage:
# Software Link:
# Version: 3.6 Build 833. Earlier versions may also be affected.
# CVE: 2015-3140
# Category: Web apps
08/02/2015: Initial disclosure to vendor and CERT
09/02/2015: Acknowledgment of vulnerabilities from vendor
11/02/2015: Disclosure deadline of 01/03/2015 agreed with vendor
19/02/2015: Disclosure deadline renegotiated to 01/04/2015 at vendor's request
09/04/2015: Disclosure deadline renegotiated to 20/04/2015 at vendor's request
20/04/2015: Confirmation of fix from vendor
07/05/2015: Disclosure
Note that the CVE-ID is for the CSRF vulnerability only. No CVE-ID has been generated for the stored XSS vulnerabilities. The vulnerable version of the product is no longer available for download from the vendor's webpage.
Syncrify 3.6 Build 833 is vulnerable to CSRF attacks, which can also be combined with stored XSS attacks (authenticated administrators only). The JSESSIONID created when a user logs on to the system is persistent and does not change across requests.
# POC 1 #
The following PoC uses the CSRF vulnerability to change the SMTP settings in the application, and combines it with two of the stored XSS vulnerabilities.
<img src="" alt="" width="1" height="1">
# POC 2 #
The following PoC uses the CSRF vulnerability to change the administrator password.
<img src="" width="0" height="0" border="0">
Stored XSS vulnerabilities are present in the following fields:
Manage Users > Add New User > User's Full Name [displayed in Reports > Backup report by user]
Example URL:
Configuration > Email Configuration > Administrator's Email [displayed in Troubleshoot and Reports pages]
Example URL:
Upgrade to the latest build of Syncrify Server, available from the link shown.

# [2018-01-01]  #